First published: Tue Nov 01 2005(Updated: )
The SELinux version of PAM before 0.78 r3 allows local users to perform brute force password guessing attacks via unix_chkpwd, which does not log failed guesses or delay its responses.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pam Extern | <=0.80 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2977 is considered to be a moderate severity vulnerability due to its potential for local brute force attacks.
To fix CVE-2005-2977, update PAM to version 0.78 r3 or later, which addresses the brute force password guessing issue.
CVE-2005-2977 affects local users of PAM versions prior to 0.78 r3 in SELinux environments.
An attacker can exploit CVE-2005-2977 to perform brute force password guessing attacks without detection.
No, CVE-2005-2977 does not log failed password attempts, making password guessing attacks easier to execute.