Improper Authentication in libpam-pgsql - CVE-2013-0191
Published: June 3, 2014 / Updated: August 4, 2020
Vulnerability identifier: #VU33552
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2013-0191
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: libpam-pgsql
Affected software:
libpam-pgsql
libpam-pgsql
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
libpam-pgsql (aka pam_pgsql) 0.7 does not properly handle a NULL value returned by the password search query, which allows remote attackers to bypass authentication via a crafted password.
How to mitigate CVE-2013-0191
Install update from vendor's website.
Sources
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://seclists.org/oss-sec/2013/q1/86
- http://seclists.org/oss-sec/2013/q1/99
- http://sourceforge.net/p/pam-pgsql/bugs/13/
- http://sourceforge.net/u/lvella/pam-pgsql/ci/9361f5970e5dd90a747319995b67c2f73b91448c/
- http://www.securityfocus.com/bid/57440
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81363