libpam-pgsql (aka pam_pgsql) 0.7 does not properly handle a NULL value returned by the password search query, which allows remote attackers to bypass authentication via a crafted password.
References
Configurations
History
21 Nov 2024, 01:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html - | |
References | () http://seclists.org/oss-sec/2013/q1/86 - | |
References | () http://seclists.org/oss-sec/2013/q1/99 - | |
References | () http://sourceforge.net/p/pam-pgsql/bugs/13/ - | |
References | () http://sourceforge.net/u/lvella/pam-pgsql/ci/9361f5970e5dd90a747319995b67c2f73b91448c/ - Exploit, Patch | |
References | () http://www.securityfocus.com/bid/57440 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/81363 - |
Information
Published : 2014-06-03 14:55
Updated : 2024-11-21 01:47
NVD link : CVE-2013-0191
Mitre link : CVE-2013-0191
CVE.ORG link : CVE-2013-0191
JSON object : View
Products Affected
lucas_clemente_vella
- libpam-pgsql
CWE
CWE-287
Improper Authentication