First published: Tue Feb 24 2009(Updated: )
An issue dealing with password changes, with respect to the MINDAYS field in /etc/shadow was reported on the Debian BTS (<a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514437">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514437</a>) that affects all versions of PAM 1.x. Because of this, if an administrative user sets the password minimum days via chage or passwd, /etc/shadow is updated correctly, but PAM allows the user to change their password with no regard for the MINDAYS setting, effectively allowing them to re-use old passwords immediately and disregard any established password policies that should be enforced. This is due to the fact that no minimum age password checks are done by PAM in 1.x; in the old versions it was done in _unix_verify_shadow() by checking the value of of sp_min. In newer PAM this check is no longer there.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE PAM | =0.99.1.0 | |
SUSE PAM | =0.99.2.0 | |
SUSE PAM | =0.99.2.1 | |
SUSE PAM | =0.99.3.0 | |
SUSE PAM | =0.99.4.0 | |
SUSE PAM | =0.99.5.0 | |
SUSE PAM | =0.99.6.0 | |
SUSE PAM | =0.99.6.1 | |
SUSE PAM | =0.99.6.2 | |
SUSE PAM | =0.99.6.3 | |
SUSE PAM | =0.99.7.0 | |
SUSE PAM | =0.99.7.1 | |
SUSE PAM | =0.99.8.0 | |
SUSE PAM | =0.99.8.1 | |
SUSE PAM | =0.99.9.0 | |
SUSE PAM | =0.99.10.0 | |
SUSE PAM | =1.0.0 | |
SUSE PAM | =1.0.1 | |
SUSE PAM | =1.0.2 | |
SUSE PAM | =1.0.3 | |
SUSE PAM | <=1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0579 is considered a moderate severity vulnerability due to its impact on password management in affected PAM versions.
To fix CVE-2009-0579, it's recommended to update to the latest version of the Linux-PAM library that has addressed the vulnerability.
CVE-2009-0579 affects all versions of Linux-PAM 1.x and earlier, including 0.99.x versions.
The risks associated with CVE-2009-0579 include potential unauthorized access due to improper password handling.
CVE-2009-0579 was reported in the context of Debian, but it affects any system using the vulnerable versions of the Linux-PAM library.