Vulnerability CVE-2005-2977


Published: 2005-11-01   Modified: 2012-02-12

Description:
The SELinux version of PAM before 0.78 r3 allows local users to perform brute force password guessing attacks via unix_chkpwd, which does not log failed guesses or delay its responses.

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
PAM -> PAM 

 References:
http://www.gentoo.org/security/en/glsa/glsa-200510-22.xml
http://secunia.com/advisories/17365
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168181
http://www.vupen.com/english/advisories/2005/2227
http://securitytracker.com/id?1015111
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10193
http://cvs.sourceforge.net/viewcvs.py/pam/Linux-PAM/NEWS?rev=1.6&view=markup
http://www.securityfocus.com/bid/15217
http://www.redhat.com/support/errata/RHSA-2005-805.html
http://secunia.com/advisories/17352
http://secunia.com/advisories/17350
http://secunia.com/advisories/17346

Copyright 2024, cxsecurity.com

 

Back to Top