First published: Tue May 26 2009(Updated: )
A security flaw was found in PAM pam_krb5 module, providing user authentication based on Kerberos principals. A remote attacker could use this flaw to recognize, if some username/login belongs to set of user accounts, existing on the system, and subsequently perform dictionary based password guess attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5 | |
pam_krb5 (PAM module) | =2.2.14 | |
pam_krb5 (PAM module) | =2.3 | |
pam_krb5 (PAM module) | =2.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1384 is considered a moderate severity vulnerability due to the potential for remote attackers to discern valid usernames.
To mitigate CVE-2009-1384, update the pam_krb5 module to a secure version that addresses this issue.
CVE-2009-1384 primarily affects pam_krb5 module versions 2.2.14, 2.3, and 2.3.4.
Yes, CVE-2009-1384 can be exploited remotely by an attacker who performs dictionary attacks on the authentication system.
CVE-2009-1384 affects systems using specific versions of the pam_krb5 module for user authentication.