CVE-2005-2641
CVSS7.5
发布时间 :2005-08-23 00:00:00
修订时间 :2010-08-21 00:31:49
NMCOPS    

[原文]Unknown vulnerability in pam_ldap before 180 does not properly handle a new password policy control, which could allow attackers to gain privileges. NOTE: CVE-2005-2497 had also been assigned to this issue, but CVE-2005-2641 is the correct candidate.


[CNNVD]PADL Software 认证绕过漏洞(CNNVD-200508-239)

        pam_ldap模块允许Solaris和Linux服务器及工作站认证LDAP目录,并在目录中更改口令。
        pam_ldap口令策略控件中存在漏洞,成功利用这个漏洞允许未经认证的远程攻击者绕过pam_ldap认证机制访问系统。如果pam_ldap客户端试图认证从PasswordPolicyResponseValue中忽略了可选错误值的LDAP服务器的话,认证尝试就总会成功。请注意如果基础LDAP客户端不支持LDAP 3版控件的话,就不会出现这个漏洞。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10370Unknown vulnerability in pam_ldap before 180 does not properly handle a new password policy control, which could allow attackers to gain pri...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2641
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2641
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200508-239
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/778916
(UNKNOWN)  CERT-VN  VU#778916
https://www.redhat.com/archives/fedora-test-list/2005-August/msg00170.html
(UNKNOWN)  MISC  https://www.redhat.com/archives/fedora-test-list/2005-August/msg00170.html
https://issues.rpath.com/browse/RPL-680
(UNKNOWN)  CONFIRM  https://issues.rpath.com/browse/RPL-680
http://www.securityfocus.com/bid/14649
(UNKNOWN)  BID  14649
http://www.securityfocus.com/archive/1/archive/1/447859/100/200/threaded
(UNKNOWN)  BUGTRAQ  20061005 rPSA-2006-0183-1 nss_ldap
http://www.redhat.com/support/errata/RHSA-2005-767.html
(UNKNOWN)  REDHAT  RHSA-2005:767
http://www.mandriva.com/security/advisories?name=MDKSA-2005:190
(UNKNOWN)  MANDRIVA  MDKSA-2005:190
http://secunia.com/advisories/17270
(UNKNOWN)  SECUNIA  17270
http://secunia.com/advisories/17233
(UNKNOWN)  SECUNIA  17233

- 漏洞信息

PADL Software 认证绕过漏洞
高危 设计错误
2005-08-23 00:00:00 2005-10-25 00:00:00
远程  
        pam_ldap模块允许Solaris和Linux服务器及工作站认证LDAP目录,并在目录中更改口令。
        pam_ldap口令策略控件中存在漏洞,成功利用这个漏洞允许未经认证的远程攻击者绕过pam_ldap认证机制访问系统。如果pam_ldap客户端试图认证从PasswordPolicyResponseValue中忽略了可选错误值的LDAP服务器的话,认证尝试就总会成功。请注意如果基础LDAP客户端不支持LDAP 3版控件的话,就不会出现这个漏洞。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        ftp://ftp.padl.com/pub/pam_ldap.tgz

- 漏洞信息 (F39766)

Gentoo Linux Security Advisory 200508-22 (PacketStormID:F39766)
2005-09-01 00:00:00
Gentoo  security.gentoo.org
advisory
linux,gentoo
CVE-2005-2641
[点击下载]

Gentoo Linux Security Advisory GLSA 200508-22 - When a pam_ldap client attempts to authenticate against an LDAP server that omits the optional error value from the PasswordPolicyResponseValue, the authentication attempt will always succeed. Versions less than 180 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200508-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: pam_ldap: Authentication bypass vulnerability
      Date: August 31, 2005
      Bugs: #103659
        ID: 200508-22

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

pam_ldap contains a vulnerability that may allow a remote attacker to
gain system access.

Background
==========

pam_ldap is a Pluggable Authentication Module which allows
authentication against LDAP directories.

Affected packages
=================

    -------------------------------------------------------------------
     Package            /  Vulnerable  /                    Unaffected
    -------------------------------------------------------------------
  1  sys-auth/pam_ldap        < 180                             >= 180

Description
===========

When a pam_ldap client attempts to authenticate against an LDAP server
that omits the optional error value from the
PasswordPolicyResponseValue, the authentication attempt will always
succeed.

Impact
======

A remote attacker may exploit this vulnerability to bypass the LDAP
authentication mechanism, gaining access to the system possibly with
elevated privileges.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All pam_ldap users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-180"

References
==========

  [ 1 ] CAN-2005-2641
        http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2641
  [ 2 ] US-CERT VU#778916
        http://www.kb.cert.org/vuls/id/778916

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200508-22.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0
    

- 漏洞信息

18963
pam_ldap Client passwordPolicyResponse BindResponse Authentication Bypass

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-08-24 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 180 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

PADL Software PAM_LDAP Authentication Bypass Vulnerability
Design Error 14649
Yes No
2005-08-24 12:00:00 2006-10-06 06:35:00
Announced by the vendor.

- 受影响的程序版本

SGI Advanced Linux Environment 3.0
rPath rPath Linux 1
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux ES 4
RedHat Desktop 4.0
Red Hat Enterprise Linux AS 4
Padl Software pam_ldap Build 179
Padl Software pam_ldap Build 169
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Mandriva Linux Mandrake 10.2 x86_64
Mandriva Linux Mandrake 10.2
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
Gentoo Linux
Conectiva Linux 10.0
Padl Software pam_ldap Build 180

- 不受影响的程序版本

Padl Software pam_ldap Build 180

- 漏洞讨论

PAM_LDAP is prone to an authentication-bypass vulnerability when handling new password policy control. This could allow an unauthorized user to bypass authentication.

This vulnerability was reported to affect PAM_LDAP builds 169 through 179.

- 漏洞利用

An exploit is not required.

- 解决方案

This issue has been addressed in Build 180 of PAM_LDAP.

Please see the referenced advisories for more information.


Padl Software pam_ldap Build 169

Padl Software pam_ldap Build 179

Conectiva Linux 10.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站