首页 -> 安全研究
安全研究
安全漏洞
Debian Linux PAM验证绕过漏洞
发布日期:2002-10-17
更新日期:2002-10-22
受影响系统:
Andrew G. Morgan Linux PAM 0.76描述:
- Debian Linux 3.0 IA-32
- Debian Linux 3.0 arm
- Debian Linux 3.0 powerpc
- Debian Linux 3.0 68k
- Debian Linux 3.0 i386
- Debian Linux 3.0 sparc
- Debian Linux 3.0 alpha
BUGTRAQ ID: 5994
CVE(CAN) ID: CVE-2002-1227
Linux PAM可以用来对用户访问和资源等进行限制。
Debian Linux PAM验证机制存在漏洞,远程攻击者可以利用这个漏洞无需密码访问系统。
PAM 0.76版本把"锁住"的密码(口令文件中的密码字段为'*')作为空密码处理,并可以通过正常的登录过程对系统进行访问。密码文件中所有密码字段为'*'的帐户,并且相关SHELL不为/bin/false的情况下,远程攻击者可以利用这些帐户访问受限制的系统。
<*来源:Paul Aurich
Samuele Giovanni Tonon
链接:http://www.debian.org/security/2002/dsa-177
*>
建议:
临时解决方法:
如果您不能立刻安装补丁或者升级,NSFOCUS建议您采取以下措施以降低威胁:
* 修改/etc/passwd,确保密码字段为'*'的帐户其相关SHELL为/bin/false。
厂商补丁:
Debian
------
Debian已经为此发布了一个安全公告(DSA-177-1)以及相应补丁:
DSA-177-1:New PAM packages fix serious security violation in Debian/unstable
链接:http://www.debian.org/security/2002/dsa-177
补丁下载:
Source archives:
http://ftp.debian.org/debian/pool/main/p/pam/pam_0.76-6.dsc
Size/MD5 checksum: 732 c7661ad0dcbc7df4ca967e58e93edd2e
http://ftp.debian.org/debian/pool/main/p/pam/pam_0.76-6.diff.gz
Size/MD5 checksum: 87185 39d8f45620b6750b34ad9128814328e7
http://ftp.debian.org/debian/pool/main/p/pam/pam_0.76.orig.tar.gz
Size/MD5 checksum: 424671 22dd4019934cbd71bc67f13a5c2e10ec
Architecture independent components:
http://ftp.debian.org/debian/pool/main/p/pam/libpam-doc_0.76-6_all.deb
Size/MD5 checksum: 651724 b3fc72ee81ac4e4413c696ec42fa4ef3
http://ftp.debian.org/debian/pool/main/p/pam/libpam-runtime_0.76-6_all.deb
Size/MD5 checksum: 51922 28398b55b183e122984c4bf1a64183a9
Alpha architecture:
http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_alpha.deb
Size/MD5 checksum: 53808 462dcd1a02dd799b761a05687cf08699
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_alpha.deb
Size/MD5 checksum: 179588 e2719b40c82af6891471c7182d8008f7
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_alpha.deb
Size/MD5 checksum: 74146 727185b2d9c55a084105e2e4c43afcd0
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_alpha.deb
Size/MD5 checksum: 116148 970c63cf78a3b7311e122069225caa06
ARM architecture:
http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_arm.deb
Size/MD5 checksum: 52268 c8f6709b9b92cac992168bfa957762cd
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_arm.deb
Size/MD5 checksum: 153494 12a21eb18e0cb8fb3043c23a78b410a8
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_arm.deb
Size/MD5 checksum: 67952 bf8953d4d7227a5f8c837921da2745c4
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_arm.deb
Size/MD5 checksum: 110738 10ecfcb5e44bb5af98deb4f5b27c16cb
Intel IA-32 architecture:
http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_i386.deb
Size/MD5 checksum: 52116 f91a3a10c47a08aae349bd16d161a644
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_i386.deb
Size/MD5 checksum: 146290 88216fe253c9e5042e8a6902bc807153
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_i386.deb
Size/MD5 checksum: 67504 a02c56dfa8949cf9abc071fc3b75ade1
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_i386.deb
Size/MD5 checksum: 107490 366d7a40aecdc674920c76f8c71684b3
Intel IA-64 architecture:
http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_ia64.deb
Size/MD5 checksum: 56320 a52fc9867c6af83788e5d999fb3c5289
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_ia64.deb
Size/MD5 checksum: 204086 1b85b7156e03bef224c783e45c4f8f36
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_ia64.deb
Size/MD5 checksum: 81374 76d3f1c7665854f137457f7d0e75d995
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_ia64.deb
Size/MD5 checksum: 118930 31ff873794cfaf4da938340fbf87c275
HP Precision architecture:
http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_hppa.deb
Size/MD5 checksum: 53646 10dce03fd0f16e7bb25cc7263b679cd2
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_hppa.deb
Size/MD5 checksum: 171266 23439afca3810b039e65e3ff5a626336
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_hppa.deb
Size/MD5 checksum: 72066 166e7a5b1f72b0585b1d1fa06d5ac4f0
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_hppa.deb
Size/MD5 checksum: 113166 bb97068c08d1e98c37a439ff044dfe0c
Motorola 680x0 architecture:
http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_m68k.deb
Size/MD5 checksum: 51886 aa1a506bbabef00284d5761e891edd3d
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_m68k.deb
Size/MD5 checksum: 151202 6064da7ddbc9ecf958e52e586b4d5fe0
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_m68k.deb
Size/MD5 checksum: 67578 3586a306ffe39e0b57b6ebd37196fbc7
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_m68k.deb
Size/MD5 checksum: 106684 db2c282058e7b2d78cb41bd7ab1bc082
Big endian MIPS architecture:
http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_mips.deb
Size/MD5 checksum: 52336 5f20d3e21ab9d2948fc74598f70a77b8
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_mips.deb
Size/MD5 checksum: 149874 4ab69f9fdb67245b2c90a192f94c4f09
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_mips.deb
Size/MD5 checksum: 68280 487a9bd02b5ba9c8b3342bcebba95658
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_mips.deb
Size/MD5 checksum: 111840 3bd2014016f6325e7853566d91ec91e4
Little endian MIPS architecture:
http://ftp.debian.org/debian/pool/main/p/pam/libpam-cracklib_0.76-6_mipsel.deb
Size/MD5 checksum: 52318 2ebabb4258a9901b601829594fae3e86
http://ftp.debian.org/debian/pool/main/p/pam/libpam-modules_0.76-6_mipsel.deb
Size/MD5 checksum: 149786 a8fa2ea4ba3a4ebd00ff3ea83048972f
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g_0.76-6_mipsel.deb
Size/MD5 checksum: 68284 0afe5c5e849c06a4802b05c7e9fd75a0
http://ftp.debian.org/debian/pool/main/p/pam/libpam0g-dev_0.76-6_mipsel.deb
Size/MD5 checksum: 111834 b7d8dab220f32c55406d7fd0175875f8
PowerPC architecture:
http://ftp.debian.org/debian/po
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
浏览次数:3279
严重程度:0(网友投票)
绿盟科技给您安全的保障