First published: Fri Dec 31 2004(Updated: )
passwd 0.68 does not check the return code for the pam_start function, which has unknown impact and attack vectors that may prevent "safe and proper operation" of PAM.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mandrakesoft Mandrake Multi Network Firewall | =8.2 | |
Mandrake Linux | =8.2 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =9.0 | |
Mandrake Linux | =8.2 | |
Mandrake Linux | =9.1 | |
Mandrake Linux | =10.0 | |
Mandrake Linux | =9.1 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandrakesoft Mandrake Multi Network Firewall | =8.2 | |
Mandrake Linux | =8.2 | |
Mandrake Linux | =8.2 | |
Mandrake Linux | =9.0 | |
Mandrake Linux | =9.1 | |
Mandrake Linux | =9.1 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =10.0 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandriva Linux Corporate Server | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-2396 is not explicitly defined, but it pertains to unhandled errors in PAM which may lead to improper operation.
To fix CVE-2004-2396, upgrade to a version of the software that addresses the PAM error handling issue.
CVE-2004-2396 affects various versions of Mandrake Linux, including 8.2, 9.0, 9.1, 9.2, and 10.0, as well as Mandrake Multi Network Firewall 8.2.
The impact of CVE-2004-2396 includes potential security risks due to the lack of error handling in the PAM library.
CVE-2004-2396 is not classified as critical, but it could pose significant risks depending on the specific usage of PAM in affected software.