{"id":"CVE-2014-2583","details":"Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.","modified":"2026-02-05T03:19:18.447565Z","published":"2014-04-10T20:29:20Z","related":["MGASA-2015-0213","openSUSE-SU-2024:10405-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/57317"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2935-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2935-2"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2935-3"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201605-05"},{"type":"EVIDENCE","url":"https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8"},{"type":"FIX","url":"https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/03/24/5"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/03/26/10"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/03/31/6"},{"type":"WEB","url":"http://www.securityfocus.com/bid/66493"}],"schema_version":"1.7.3"}