发布时间 :2004-08-06 00:00:00
修订时间 :2017-10-10 21:29:30

[原文]Solaris 9, when configured as a Kerberos client with patch 112908-12 or 115168-03 and using pam_krb5 as an "auth" module with the debug feature enabled, records passwords in plaintext, which could allow local users to gain other user's passwords by reading log files.

[CNNVD]Sun Solaris补丁112908-12和115168-03明文口令记录漏洞(CNNVD-200408-021)

        Solaris是一款由Sun Microsystems公司开发和维护的商业性质UNIX操作系统。
        Solaris系统安装了带补丁的112908-12或115168-03 Kerberos客户端存在问题,可导致验证密码以明文方式被记录。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:255Clear Text Password Logging Vulnerability
oval:org.mitre.oval:def:2065Kerberos Client Plaintext Password Vulnerability

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  10606
(UNKNOWN)  XF  solaris-kerberos-password-plaintext(16450)

- 漏洞信息

Sun Solaris补丁112908-12和115168-03明文口令记录漏洞
低危 设计错误
2004-08-06 00:00:00 2005-10-20 00:00:00
        Solaris是一款由Sun Microsystems公司开发和维护的商业性质UNIX操作系统。
        Solaris系统安装了带补丁的112908-12或115168-03 Kerberos客户端存在问题,可导致验证密码以明文方式被记录。

- 公告与补丁

        Sun Patch 115168-03:
        Sun Patch 115168-04

        Sun Patch 112908-12:
        Sun Patch 112908-13

- 漏洞信息

Solaris Kerberos Client Cleartext Password Disclosure
Local Access Required Cryptographic, Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Sun Solaris contains a flaw that may lead to an unauthorized password exposure. It is possible to gain access to plaintext passwords when the debug feature of pam_krb5 is enabled, but only if these two conditions are met: SunSolve patch 112908-12 or 115168-03 is installed and a service uses pam_krb5 as an "auth" module. Under these conditions, password authentication for the user will be logged in plaintext at LOG_DEBUG level, which may lead to a loss of confidentiality.

- 时间线

2004-06-17 Unknow
2004-06-17 Unknow

- 解决方案

Sun has released a patch to address this vulnerability. It is possible to correct the flaw by implementing the following workarounds provided by Sun Microsystems: A) Back out patch 112908-12 (SPARC platform) or 115168-03 (x86 platform) OR B) Disable the debug feature of pam_krb5. Search for any matching lines using the following command, and remove the "debug" entry from that line in the "/etc/pam.conf" (see pam.conf(4)) file: $ egrep -e '[\\t ]*[^#].*pam_krb5.*debug' /etc/pam.conf OR C) Disable logging of LOG_DEBUG level messages, which can be achieved by the following steps: 1. Remove or comment out entries in the "etc/syslog.conf" (see syslog.conf(4)) file that match output from the following command: $ egrep -e '\*.debug|daemon.debug' /etc/syslog.conf 2. Send a SIGHUP to syslogd: $ pkill -HUP syslog

- 相关参考

- 漏洞作者

Unknown or Incomplete