Lucene search

K
gentooGentoo FoundationGLSA-200508-22
HistoryAug 31, 2005 - 12:00 a.m.

pam_ldap: Authentication bypass vulnerability

2005-08-3100:00:00
Gentoo Foundation
security.gentoo.org
11

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.021 Low

EPSS

Percentile

89.3%

Background

pam_ldap is a Pluggable Authentication Module which allows authentication against LDAP directories.

Description

When a pam_ldap client attempts to authenticate against an LDAP server that omits the optional error value from the PasswordPolicyResponseValue, the authentication attempt will always succeed.

Impact

A remote attacker may exploit this vulnerability to bypass the LDAP authentication mechanism, gaining access to the system possibly with elevated privileges.

Workaround

There is no known workaround at this time.

Resolution

All pam_ldap users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-180"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-auth/pam_ldap< 180UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.021 Low

EPSS

Percentile

89.3%