
Bugtraq mailing list archives
Slackware 7.0 - login bug
From: stewart () GLOBAL CO ZA (Stewart Gebbie)
Date: Thu, 2 Dec 1999 17:30:46 +0200
Hi, Below I describe a bug in Slackware 7.0. I did notify support () slackware com about a week ago and thought that it was about time to send the bug report to bugtraq. This is regarding a logic but in the shadow suite that enables a brute force attack for finding and cracking login in accounts via telnet (and possibly some other nasty side affects). The bug comes about as a result of the interplay between using md5_crypt and disabling the traditional crypt. The bug occurs when either an account is locked or the account does not exits. In either case the result is that login.c makes a call to pw_auth() in pwauth.c with the password set to "!". This in turn calls _old_auth() in pwauth.c. This finally calls pw_encrypt() in encrypt.c. Now because the password is set to "!" (and not "$1$") the md5_crypt function is not called. Instead the tradition crypt() is called. This has, as far as I can see, been disabled in the Slack 7.0 distribution and always returns NULL and sets errno=95. This causes pw_encrypt() to print out `crypt: Operation not supported' and immediatly call exit(1). Hence, from logging in one can see that the user name does not exist or is locked, further more the exit is immediate with no sleep before prompting again. I did not confirm that crypt() was disabled in the glibc source (simply because it meant downloading all of the glibc source). But the test program I wrote did seem to confirm this. Thanks Stewart
Current thread:
- Fwd: RE: Multiples Remotes DoS Attacks in MDaemon Server v2.8.5.0 Vulnerability Arvel Hathcock (Nov 30)
- Re: Multiples Remotes DoS Attacks in MDaemonServer v2.8.5.0Vulnerability Nobuo Miwa (Dec 01)
- Insecure default permissions for MailMan Professional Edition, version 3.0.18 S, Jared (Dec 01)
- Remote DoS Attack in Serv-U FTP-Server v2.5a Vulnerability Ussr Labs (Dec 02)
- Slackware 7.0 - login bug Stewart Gebbie (Dec 02)