CERTA-2006-AVI-485
Vulnerability from certfr_avis

PAM (Pluggable Authentification Module) est un système de gestion de la politique d'authentification. Parmi les modules, pam_ldap permet de gérer l'interface avec un annuaire ldap. Une vulnérabilité dans le module pam_ldap pourrait être exploitée afin de contourner la politique de sécurité en faussant la phase d'authentification.

Description

La vulnérabilité du module pam_ldap provoque une réponse positive de la fonction pam_authenticate même si l'authentification du client pam_ldap a échoué. Cette vulnérabilité permet donc à un attaquant de se connecter de façon illégitime.

Contournement provisoire

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A Mandriva 2006.0 ;
N/A N/A Mandriva CS4.0.
N/A N/A Mandriva 2007.0 ;
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Mandriva 2006.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Mandriva CS4.0.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Mandriva 2007.0 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLa vuln\u00e9rabilit\u00e9 du module pam_ldap provoque une r\u00e9ponse positive de la\nfonction pam_authenticate m\u00eame si l\u0027authentification du client pam_ldap\na \u00e9chou\u00e9. Cette vuln\u00e9rabilit\u00e9 permet donc \u00e0 un attaquant de se connecter\nde fa\u00e7on ill\u00e9gitime.\n\n## Contournement provisoire\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2006-11-09T00:00:00",
  "last_revision_date": "2006-11-09T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2006:201 du 09 novembre    2006 :",
      "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:201"
    }
  ],
  "reference": "CERTA-2006-AVI-485",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2006-11-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "PAM (Pluggable Authentification Module) est un syst\u00e8me de gestion de la\npolitique d\u0027authentification. Parmi les modules, pam_ldap permet de\ng\u00e9rer l\u0027interface avec un annuaire ldap. Une vuln\u00e9rabilit\u00e9 dans le\nmodule pam_ldap pourrait \u00eatre exploit\u00e9e afin de contourner la politique\nde s\u00e9curit\u00e9 en faussant la phase d\u0027authentification.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans le module pam_ldap",
  "vendor_advisories": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…