Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&%3Br2=1.10&%3Bview=patch | x_refsource_CONFIRM |
| http://www.mandriva.com/security/advisories?name=MDVSA-2009:077 | vendor-advisory x_refsource_MANDRIVA |
| http://openwall.com/lists/oss-security/2009/03/05/1 | mailing-list x_refsource_MLIST |
| https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html | vendor-advisory x_refsource_FEDORA |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/49110 | vdb-entry x_refsource_XF |
| http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log | x_refsource_CONFIRM |
| http://www.securityfocus.com/bid/34010 | vdb-entry x_refsource_BID |
| https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html | vendor-advisory x_refsource_FEDORA |
| http://secunia.com/advisories/34733 | third-party-advisory x_refsource_SECUNIA |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&%3Br2=1.10&%3Bview=patch | x_refsource_CONFIRM x_transferred |
| http://www.mandriva.com/security/advisories?name=MDVSA-2009:077 | vendor-advisory x_refsource_MANDRIVA x_transferred |
| http://openwall.com/lists/oss-security/2009/03/05/1 | mailing-list x_refsource_MLIST x_transferred |
| https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html | vendor-advisory x_refsource_FEDORA x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/49110 | vdb-entry x_refsource_XF x_transferred |
| http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log | x_refsource_CONFIRM x_transferred |
| http://www.securityfocus.com/bid/34010 | vdb-entry x_refsource_BID x_transferred |
| https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html | vendor-advisory x_refsource_FEDORA x_transferred |
| http://secunia.com/advisories/34733 | third-party-advisory x_refsource_SECUNIA x_transferred |
Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 6.6 | MEDIUM | AV:L/AC:M/Au:S/C:C/I:C/A:C |
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0887 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
| Hyperlink | Source | Resource |
|---|---|---|
| http://openwall.com/lists/oss-security/2009/03/05/1 | cve@mitre.org | Exploit |
| http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&%3Br2=1.10&%3Bview=patch | cve@mitre.org | N/A |
| http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log | cve@mitre.org | N/A |
| http://secunia.com/advisories/34733 | cve@mitre.org | N/A |
| http://www.mandriva.com/security/advisories?name=MDVSA-2009:077 | cve@mitre.org | N/A |
| http://www.securityfocus.com/bid/34010 | cve@mitre.org | Patch |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/49110 | cve@mitre.org | N/A |
| https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html | cve@mitre.org | N/A |
| https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html | cve@mitre.org | N/A |