Rule Set Based Access Control (RSBAC) before 1.3.5 does not properly use the Linux Kernel Crypto API for the Linux kernel 2.6.x, which allows context-dependent attackers to bypass authentication controls via unspecified vectors, possibly involving User Management password hashing and unchecked function return codes.
References
Link | Resource |
---|---|
http://download.rsbac.org/code/1.3.5/changes-1.3.5.txt | Vendor Advisory |
http://secunia.com/advisories/26147 | Broken Link |
http://securityreason.com/securityalert/2911 | Third Party Advisory |
http://www.securityfocus.com/archive/1/474161/100/0/threaded | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/25001 | Broken Link Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2007/2610 | URL Repurposed |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2007-07-23 23:30
Updated : 2023-06-20 18:09
NVD link : CVE-2007-3945
Mitre link : CVE-2007-3945
CVE.ORG link : CVE-2007-3945
JSON object : View
Products Affected
linux
- linux_kernel
rsbac
- rule_set_based_access_control
CWE