Описание
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).
Ссылки
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
- Mailing List
- ExploitMailing ListThird Party Advisory
- Vendor Advisory
- ExploitMailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
- Mailing List
- ExploitMailing ListThird Party Advisory
- Vendor Advisory
- ExploitMailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:o:openbsd:openbsd:6.6:*:*:*:*:*:*:*
EPSS
Процентиль: 67%
0.00539
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-287
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).
EPSS
Процентиль: 67%
0.00539
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-287