GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Aug 31, 2005 3:06 pm Post subject: [ GLSA 200508-22 ] pam_ldap: Authentication bypass vulnerabi |
|
|
Gentoo Linux Security Advisory
Title: pam_ldap: Authentication bypass vulnerability (GLSA 200508-22)
Severity: normal
Exploitable: remote
Date: August 31, 2005
Bug(s): #103659
ID: 200508-22
Synopsis
pam_ldap contains a vulnerability that may allow a remote attacker to gain
system access.
Background
pam_ldap is a Pluggable Authentication Module which allows
authentication against LDAP directories.
Affected Packages
Package: sys-auth/pam_ldap
Vulnerable: < 180
Unaffected: >= 180
Architectures: All supported architectures
Description
When a pam_ldap client attempts to authenticate against an LDAP
server that omits the optional error value from the
PasswordPolicyResponseValue, the authentication attempt will always
succeed.
Impact
A remote attacker may exploit this vulnerability to bypass the
LDAP authentication mechanism, gaining access to the system possibly
with elevated privileges.
Workaround
There is no known workaround at this time.
Resolution
All pam_ldap users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-180" |
References
CAN-2005-2641
US-CERT VU#778916
Last edited by GLSA on Fri Oct 10, 2014 4:20 am; edited 5 times in total |
|