CVE-2004-0653
CVSS2.1
发布时间 :2004-08-06 00:00:00
修订时间 :2008-09-10 15:27:09
NMCO    

[原文]Solaris 9, when configured as a Kerberos client with patch 112908-12 or 115168-03 and using pam_krb5 as an "auth" module with the debug feature enabled, records passwords in plaintext, which could allow local users to gain other user's passwords by reading log files.


[CNNVD]Sun Solaris补丁112908-12和115168-03明文口令记录漏洞(CNNVD-200408-021)

        
        Solaris是一款由Sun Microsystems公司开发和维护的商业性质UNIX操作系统。
        Solaris系统安装了带补丁的112908-12或115168-03 Kerberos客户端存在问题,可导致验证密码以明文方式被记录。
        当安装了112908-12或115168-03补丁的Kerberos客户端,并使用pam_krb5作为"auth"模块的任何服务,那么当pam_krb5使用调试功能时,用户的验证口令在LOG_DEBUG条件下会以明文方式记录。
        <*链接:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57587
        *>

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:255Clear Text Password Logging Vulnerability
oval:org.mitre.oval:def:2065Kerberos Client Plaintext Password Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0653
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0653
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-021
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/523710
(VENDOR_ADVISORY)  CERT-VN  VU#523710
http://www.ciac.org/ciac/bulletins/o-172.shtml
(VENDOR_ADVISORY)  CIAC  O-172
http://xforce.iss.net/xforce/xfdb/16450
(VENDOR_ADVISORY)  XF  solaris-kerberos-password-plaintext(16450)
http://www.securityfocus.com/bid/10606
(UNKNOWN)  BID  10606
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57587
(UNKNOWN)  SUNALERT  57587
http://secunia.com/advisories/11940/
(UNKNOWN)  SECUNIA  11940
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101519-1
(UNKNOWN)  SUNALERT  101519

- 漏洞信息

Sun Solaris补丁112908-12和115168-03明文口令记录漏洞
低危 设计错误
2004-08-06 00:00:00 2005-10-20 00:00:00
本地  
        
        Solaris是一款由Sun Microsystems公司开发和维护的商业性质UNIX操作系统。
        Solaris系统安装了带补丁的112908-12或115168-03 Kerberos客户端存在问题,可导致验证密码以明文方式被记录。
        当安装了112908-12或115168-03补丁的Kerberos客户端,并使用pam_krb5作为"auth"模块的任何服务,那么当pam_krb5使用调试功能时,用户的验证口令在LOG_DEBUG条件下会以明文方式记录。
        <*链接:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57587
        *>

- 公告与补丁

        厂商补丁:
        Sun
        ---
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Sun Patch 115168-03:
        Sun Patch 115168-04
        
        http://sunsolve.sun.com/pub-cgi/115168-04.zip

        Sun Patch 112908-12:
        Sun Patch 112908-13
        
        http://sunsolve.sun.com/pub-cgi/112908-13.zip

- 漏洞信息

7254
Solaris Kerberos Client Cleartext Password Disclosure
Local Access Required Cryptographic, Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Sun Solaris contains a flaw that may lead to an unauthorized password exposure. It is possible to gain access to plaintext passwords when the debug feature of pam_krb5 is enabled, but only if these two conditions are met: SunSolve patch 112908-12 or 115168-03 is installed and a service uses pam_krb5 as an "auth" module. Under these conditions, password authentication for the user will be logged in plaintext at LOG_DEBUG level, which may lead to a loss of confidentiality.

- 时间线

2004-06-17 Unknow
2004-06-17 Unknow

- 解决方案

Sun has released a patch to address this vulnerability. It is possible to correct the flaw by implementing the following workarounds provided by Sun Microsystems: A) Back out patch 112908-12 (SPARC platform) or 115168-03 (x86 platform) OR B) Disable the debug feature of pam_krb5. Search for any matching lines using the following command, and remove the "debug" entry from that line in the "/etc/pam.conf" (see pam.conf(4)) file: $ egrep -e '[\\t ]*[^#].*pam_krb5.*debug' /etc/pam.conf OR C) Disable logging of LOG_DEBUG level messages, which can be achieved by the following steps: 1. Remove or comment out entries in the "etc/syslog.conf" (see syslog.conf(4)) file that match output from the following command: $ egrep -e '\*.debug|daemon.debug' /etc/syslog.conf 2. Send a SIGHUP to syslogd: $ pkill -HUP syslog

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站