发布时间 :2001-03-12 00:00:00
修订时间 :2008-09-09 08:34:24

[原文]ptylogin in Unix systems allows users to perform a denial of service by locking out modems, dial out with that modem, or obtain passwords.



- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

高危 未知
2001-03-12 00:00:00 2005-10-20 00:00:00

- 公告与补丁


- 漏洞信息

ptylogin Modem Resource DoS
Local Access Required Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

ptylogin contains a flaw that may allow a remote denial of service. The issue is triggered when a malicious user caused to modem to quit accepting incomming calles, and will result in loss of availability for the modem.

- 时间线

1999-01-27 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): 1. Use mgetty-1.1.20 provided 'ptylogin' program. Update mgetty's login.config with: * root dialin /usr/bin/ptylogin 2. Use rlogin to login. Update getty's login.config with: * nobody dialin /usr/bin/rlogin -8E localhost -l WARNING: please check that if you enter nobody as user name, you don't get a shell. This could happen if nobody has a shell and localhost is listed in ~nobody/.rhosts or /etc/hosts.equiv. The work-around works as long as there is no other specific configuration in login.config (AutoPPP and FIDO are ok; user specific login commands are NOT, unless the login program refuses user name switch, ie doesn't retry on failure).

- 相关参考

- 漏洞作者