#VU23423 Improper Authentication in OpenBSD - CVE-2019-19521

 

#VU23423 Improper Authentication in OpenBSD - CVE-2019-19521

Published: December 5, 2019


Vulnerability identifier: #VU23423
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2019-19521
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenBSD
Software vendor:
OpenBSD

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in gen/auth_subr.c and gen/authenticate.c in libc, login/login.c and xenocara/app/xenodm/greeter/verify.c when handling authentication requests via the -schallenge username. A remote attacker can bypass authentication process for daemons that use vulnerable authentication scheme (e.g. smtpd, ldapd, or radiusd).

Successful exploitation of the vulnerability may allow an attacker to gain unauthorized access to the system.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links