pam_unix.so in Linux-PAM 0.99.7.0 allows context-dependent attackers to log into accounts whose password hash, as stored in /etc/passwd or /etc/shadow, has only two characters.
References
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/32017 - | |
References | () http://secunia.com/advisories/23858 - | |
References | () http://www.novell.com/linux/security/advisories/2007_3_sr.html - | |
References | () http://www.redhat.com/archives/fedora-devel-list/2007-January/msg01271.html - Vendor Advisory | |
References | () http://www.redhat.com/archives/fedora-devel-list/2007-January/msg01277.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/22204 - | |
References | () http://www.vupen.com/english/advisories/2007/0323 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31739 - | |
References | () https://www.redhat.com/archives/pam-list/2007-January/msg00017.html - Vendor Advisory |
Information
Published : 2007-01-23 21:28
Updated : 2024-11-21 00:24
NVD link : CVE-2007-0003
Mitre link : CVE-2007-0003
CVE.ORG link : CVE-2007-0003
JSON object : View
Products Affected
andrew_morgan
- linux_pam
CWE