首页 -> 安全研究

安全研究

安全漏洞
Debian Linux PAM验证绕过漏洞

发布日期:2002-10-17
更新日期:2002-10-22

受影响系统:
Andrew G. Morgan Linux PAM 0.76
    - Debian Linux 3.0 IA-32
    - Debian Linux 3.0 arm
    - Debian Linux 3.0 powerpc
    - Debian Linux 3.0 68k
    - Debian Linux 3.0 i386
    - Debian Linux 3.0 sparc
    - Debian Linux 3.0 alpha
描述:
BUGTRAQ  ID: 5994
CVE(CAN) ID: CVE-2002-1227

Linux PAM可以用来对用户访问和资源等进行限制。

Debian Linux PAM验证机制存在漏洞,远程攻击者可以利用这个漏洞无需密码访问系统。

PAM 0.76版本把"锁住"的密码(口令文件中的密码字段为'*')作为空密码处理,并可以通过正常的登录过程对系统进行访问。密码文件中所有密码字段为'*'的帐户,并且相关SHELL不为/bin/false的情况下,远程攻击者可以利用这些帐户访问受限制的系统。

<*来源:Paul Aurich
        Samuele Giovanni Tonon
  
  链接:http://www.debian.org/security/2002/dsa-177
*>

建议:
临时解决方法:

如果您不能立刻安装补丁或者升级,NSFOCUS建议您采取以下措施以降低威胁:

* 修改/etc/passwd,确保密码字段为'*'的帐户其相关SHELL为/bin/false。

厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-177-1)以及相应补丁:
DSA-177-1:New PAM packages fix serious security violation in Debian/unstable
链接:http://www.debian.org/security/2002/dsa-177

补丁下载:

Source archives:

http://ftp.debian.org/debian/pool/main/p/pam/pam_0.76-6.dsc
Size/MD5 checksum:      732 c7661ad0dcbc7df4ca967e58e93edd2e
http://ftp.debian.org/debian/pool/main/p/pam/pam_0.76-6.diff.gz
Size/MD5 checksum:    87185 39d8f45620b6750b34ad9128814328e7
http://ftp.debian.org/debian/pool/main/p/pam/pam_0.76.orig.tar.gz
Size/MD5 checksum:   424671 22dd4019934cbd71bc67f13a5c2e10ec

Architecture independent components:

http://ftp.debian.org/debian/pool/main/p/pam/libpam-doc_0.76-6_all.deb
Size/MD5 checksum:   651724 b3fc72ee81ac4e4413c696ec42fa4ef3
http://ftp.debian.org/debian/pool/main/p/pam/libpam-runtime_0.76-6_all.deb
Size/MD5 checksum:    51922 28398b55b183e122984c4bf1a64183a9

Alpha architecture:

http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_alpha.deb
Size/MD5 checksum:    53808 462dcd1a02dd799b761a05687cf08699
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_alpha.deb
Size/MD5 checksum:   179588 e2719b40c82af6891471c7182d8008f7
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_alpha.deb
Size/MD5 checksum:    74146 727185b2d9c55a084105e2e4c43afcd0
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_alpha.deb
Size/MD5 checksum:   116148 970c63cf78a3b7311e122069225caa06

ARM architecture:

http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_arm.deb
Size/MD5 checksum:    52268 c8f6709b9b92cac992168bfa957762cd
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_arm.deb
Size/MD5 checksum:   153494 12a21eb18e0cb8fb3043c23a78b410a8
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_arm.deb
Size/MD5 checksum:    67952 bf8953d4d7227a5f8c837921da2745c4
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_arm.deb
Size/MD5 checksum:   110738 10ecfcb5e44bb5af98deb4f5b27c16cb

Intel IA-32 architecture:

http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_i386.deb
Size/MD5 checksum:    52116 f91a3a10c47a08aae349bd16d161a644
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_i386.deb
Size/MD5 checksum:   146290 88216fe253c9e5042e8a6902bc807153
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_i386.deb
Size/MD5 checksum:    67504 a02c56dfa8949cf9abc071fc3b75ade1
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_i386.deb
Size/MD5 checksum:   107490 366d7a40aecdc674920c76f8c71684b3

Intel IA-64 architecture:

http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_ia64.deb
Size/MD5 checksum:    56320 a52fc9867c6af83788e5d999fb3c5289
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_ia64.deb
Size/MD5 checksum:   204086 1b85b7156e03bef224c783e45c4f8f36
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_ia64.deb
Size/MD5 checksum:    81374 76d3f1c7665854f137457f7d0e75d995
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_ia64.deb
Size/MD5 checksum:   118930 31ff873794cfaf4da938340fbf87c275

HP Precision architecture:

http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_hppa.deb
Size/MD5 checksum:    53646 10dce03fd0f16e7bb25cc7263b679cd2
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_hppa.deb
Size/MD5 checksum:   171266 23439afca3810b039e65e3ff5a626336
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_hppa.deb
Size/MD5 checksum:    72066 166e7a5b1f72b0585b1d1fa06d5ac4f0
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_hppa.deb
Size/MD5 checksum:   113166 bb97068c08d1e98c37a439ff044dfe0c

Motorola 680x0 architecture:

http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_m68k.deb
Size/MD5 checksum:    51886 aa1a506bbabef00284d5761e891edd3d
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_m68k.deb
Size/MD5 checksum:   151202 6064da7ddbc9ecf958e52e586b4d5fe0
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_m68k.deb
Size/MD5 checksum:    67578 3586a306ffe39e0b57b6ebd37196fbc7
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_m68k.deb
Size/MD5 checksum:   106684 db2c282058e7b2d78cb41bd7ab1bc082

Big endian MIPS architecture:

http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_mips.deb
Size/MD5 checksum:    52336 5f20d3e21ab9d2948fc74598f70a77b8
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_mips.deb
Size/MD5 checksum:   149874 4ab69f9fdb67245b2c90a192f94c4f09
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_mips.deb
Size/MD5 checksum:    68280 487a9bd02b5ba9c8b3342bcebba95658
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_mips.deb
Size/MD5 checksum:   111840 3bd2014016f6325e7853566d91ec91e4

Little endian MIPS architecture:

http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_mipsel.deb
Size/MD5 checksum:    52318 2ebabb4258a9901b601829594fae3e86
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_mipsel.deb
Size/MD5 checksum:   149786 a8fa2ea4ba3a4ebd00ff3ea83048972f
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_mipsel.deb
Size/MD5 checksum:    68284 0afe5c5e849c06a4802b05c7e9fd75a0
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_mipsel.deb
Size/MD5 checksum:   111834 b7d8dab220f32c55406d7fd0175875f8

PowerPC architecture:

http://ftp.debian.org/debian/po


补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

浏览次数:3279
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障