pam-auth-update for PAM, as used in Ubuntu 8.10 and 9.4, and Debian GNU/Linux, does not properly handle an "empty selection" for system authentication modules in certain rare configurations, which causes any attempt to be successful and allows remote attackers to bypass authentication.
References
| Link | Resource |
|---|---|
| http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927 | Issue Tracking Mailing List |
| http://secunia.com/advisories/36620 | Broken Link Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2009/09/08/7 | Mailing List |
| http://www.securityfocus.com/bid/36306 | Broken Link Patch Third Party Advisory VDB Entry |
| https://launchpad.net/bugs/410171 | Issue Tracking Patch |
| https://usn.ubuntu.com/828-1/ | Broken Link |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-09-17 10:30
Updated : 2024-02-13 17:42
NVD link : CVE-2009-3232
Mitre link : CVE-2009-3232
CVE.ORG link : CVE-2009-3232
JSON object : View
Products Affected
canonical
- ubuntu_linux
CWE
CWE-287
Improper Authentication
