Full Disclosure mailing list archives
[ GLSA 200603-13 ] PEAR-Auth: Potential authentication bypass
From: Stefan Cornelius <dercorny () gentoo org>
Date: Fri, 17 Mar 2006 18:40:16 +0100
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200603-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: PEAR-Auth: Potential authentication bypass
Date: March 17, 2006
Bugs: #123832
ID: 200603-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
PEAR-Auth did not correctly verify data passed to the DB and LDAP
containers, thus allowing to inject false credentials to bypass the
authentication.
Background
==========
PEAR-Auth is a PEAR package that provides methods to create a PHP based
authentication system.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-php/PEAR-Auth < 1.2.4 >= 1.2.4
Description
===========
Matt Van Gundy discovered that PEAR-Auth did not correctly validate
data passed to the DB and LDAP containers.
Impact
======
A remote attacker could possibly exploit this vulnerability to bypass
the authentication mechanism by injecting specially crafted input to
the underlying storage containers.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All PEAR-Auth users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-php/PEAR-Auth-1.2.4"
References
==========
[ 1 ] CVE-2006-0868
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0868
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200603-13.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2006 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.0
Attachment:
_bin
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [ GLSA 200603-13 ] PEAR-Auth: Potential authentication bypass Stefan Cornelius (Mar 17)
