Description
It was found that libpam4j up to and including 1.8 did not properly validate user accounts when authenticating. A user with a valid password for a disabled account would be able to bypass security restrictions and possibly access sensitive information.
Remediation
References
https://access.redhat.com/errata/RHSA-2017:2904
https://access.redhat.com/errata/RHSA-2017:2905
https://access.redhat.com/errata/RHSA-2017:2906
https://bugzilla.redhat.com/show_bug.cgi?id=1503103
https://lists.debian.org/debian-lts-announce/2017/11/msg00008.html
https://www.debian.org/security/2017/dsa-4025
Related Vulnerabilities
CVE-2022-3509 Vulnerability in maven package com.google.protobuf:protobuf-java
CVE-2022-25167 Vulnerability in maven package org.apache.flume.flume-ng-sources:flume-jms-source
CVE-2018-16490 Vulnerability in npm package mpath
CVE-2017-18077 Vulnerability in maven package org.webjars.npm:brace-expansion
CVE-2020-21122 Vulnerability in maven package com.bstek.ureport:ureport2-console