Lucene search

K
gentooGentoo FoundationGLSA-200508-22
HistoryAug 31, 2005 - 12:00 a.m.

pam_ldap: Authentication bypass vulnerability

2005-08-3100:00:00
Gentoo Foundation
security.gentoo.org
36

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.018

Percentile

88.2%

Background

pam_ldap is a Pluggable Authentication Module which allows authentication against LDAP directories.

Description

When a pam_ldap client attempts to authenticate against an LDAP server that omits the optional error value from the PasswordPolicyResponseValue, the authentication attempt will always succeed.

Impact

A remote attacker may exploit this vulnerability to bypass the LDAP authentication mechanism, gaining access to the system possibly with elevated privileges.

Workaround

There is no known workaround at this time.

Resolution

All pam_ldap users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-180"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-auth/pam_ldap< 180UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.018

Percentile

88.2%