SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Pam (Pluggable Authentication Modules) Vendors:   Linux-PAM Project
PAM with SELinux Lets Local Users Invoke unix_chkpwd to Conduct Password Guessing Attacks
SecurityTracker Alert ID:  1015111
SecurityTracker URL:  http://securitytracker.com/id/1015111
CVE Reference:   CVE-2005-2977   (Links to External Site)
Date:  Oct 26 2005
Impact:   User access via local system

Version(s): 0.80 and prior versions
Description:   A vulnerability was reported in PAM (Pluggable Authentication Modules) when SELinux is enabled. A local user can conduct password guessing attacks.

The PAM unix_chkpwd helper program does not properly validate user-supplied passwords when SELinux is enabled. The SELinux functions allow a local user without root privileges to invoke unix_chkpwd to verify the password of another local user. The unix_chkpwd function does not provide any delay or logging functions. As a result, a local user can conduct brute force password guessing attacks.

Tomas Mraz reported this vulnerability.

Impact:   A local user can conduct brute force password guessing attacks against accounts on the target system.
Solution:   No upstream solution was available at the time of this entry.

Red Hat has issued a fix for Red Hat Enterprise Linux 4:

https://rhn.redhat.com/errata/RHSA-2005-805.html

Vendor URL:  www.kernel.org/pub/linux/libs/pam/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 27 2005 (Red Hat Issues Fix) PAM with SELinux Lets Local Users Invoke unix_chkpwd to Conduct Password Guessing Attacks
Red Hat has released a fix for Red Hat Enterprise Linux 4.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC