[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-0191Date: (C)2015-12-16   (M)2023-12-22


libpam-pgsql (aka pam_pgsql) 0.7 does not properly handle a NULL value returned by the password search query, which allows remote attackers to bypass authentication via a crafted password.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
BID-57440
SUSE-SU-2016:1996
SUSE-SU-2016:2089
http://seclists.org/oss-sec/2013/q1/86
http://seclists.org/oss-sec/2013/q1/99
http://sourceforge.net/p/pam-pgsql/bugs/13/
http://sourceforge.net/u/lvella/pam-pgsql/ci/9361f5970e5dd90a747319995b67c2f73b91448c/
libpampgsql-password-sec-bypass(81363)

CPE    1
cpe:/a:lucas_clemente_vella:libpam-pgsql:0.7
CWE    1
CWE-287
OVAL    2
oval:org.secpod.oval:def:89045186
oval:org.secpod.oval:def:89045381

© SecPod Technologies