Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0191

Опубликовано: 03 июн. 2014
Источник: debian
EPSS Низкий

Описание

libpam-pgsql (aka pam_pgsql) 0.7 does not properly handle a NULL value returned by the password search query, which allows remote attackers to bypass authentication via a crafted password.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pam-pgsqlfixed0.7.3.1-4package
pam-pgsqlfixed0.7.1-4+squeeze2squeezepackage

Примечания

  • patch: https://sourceforge.net/u/lvella/pam-pgsql/ci/9361f5970e5dd90a747319995b67c2f73b91448c/

  • bugreport: https://sourceforge.net/p/pam-pgsql/bugs/13/

EPSS

Процентиль: 77%
0.00996
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

libpam-pgsql (aka pam_pgsql) 0.7 does not properly handle a NULL value returned by the password search query, which allows remote attackers to bypass authentication via a crafted password.

nvd
больше 11 лет назад

libpam-pgsql (aka pam_pgsql) 0.7 does not properly handle a NULL value returned by the password search query, which allows remote attackers to bypass authentication via a crafted password.

github
почти 4 года назад

libpam-pgsql (aka pam_pgsql) 0.7 does not properly handle a NULL value returned by the password search query, which allows remote attackers to bypass authentication via a crafted password.

EPSS

Процентиль: 77%
0.00996
Низкий