Vulnerability Name: | CVE-2013-0191 (CCN-81363) | ||||||||||||||||||||
Assigned: | 2012-12-06 | ||||||||||||||||||||
Published: | 2013-01-16 | ||||||||||||||||||||
Updated: | 2017-08-29 | ||||||||||||||||||||
Summary: | libpam-pgsql (aka pam_pgsql) 0.7 does not properly handle a NULL value returned by the password search query, which allows remote attackers to bypass authentication via a crafted password. | ||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-287 | ||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2013-0191 Source: SUSE Type: UNKNOWN SUSE-SU-2016:1996 Source: SUSE Type: UNKNOWN SUSE-SU-2016:2089 Source: MLIST Type: UNKNOWN [oss-security] 20130115 pam-pgsql NULL password handling issue Source: CCN Type: oss-sec mailing list, Wed, 16 Jan 2013 08:45:02 -0700 Re: pam-pgsql NULL password handling issue Source: MLIST Type: UNKNOWN [oss-security] 20130116 Re: pam-pgsql NULL password handling issue Source: MISC Type: UNKNOWN http://sourceforge.net/p/pam-pgsql/bugs/13/ Source: CCN Type: SourceForge.net Web site libpam-pgsql Source: MISC Type: Exploit, Patch http://sourceforge.net/u/lvella/pam-pgsql/ci/9361f5970e5dd90a747319995b67c2f73b91448c/ Source: BID Type: UNKNOWN 57440 Source: CCN Type: BID-57440 libpam-pgsql NULL Password Authentication Bypass Vulnerability Source: XF Type: UNKNOWN libpampgsql-password-sec-bypass(81363) Source: XF Type: UNKNOWN libpampgsql-password-sec-bypass(81363) | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |