First published: Wed Aug 28 2013(Updated: )
EMC RSA Authentication Agent for PAM 7.0 before 7.0.2.1 enforces the maximum number of login attempts within the PAM-enabled application codebase, instead of within the Agent codebase, which makes it easier for remote attackers to discover correct login credentials via a brute-force attack.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RSA Authentication Agent SDK for C | =7.0.0 | |
EMC RSA Authentication Agent SDK for C | =7.0.1 | |
EMC RSA Authentication Agent SDK for C | =7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3271 is classified as a medium severity vulnerability.
To fix CVE-2013-3271, upgrade EMC RSA Authentication Agent for PAM to version 7.0.2.1 or later.
CVE-2013-3271 is caused by the enforcement of login attempt limits being handled in the PAM-enabled application rather than in the Agent codebase.
CVE-2013-3271 affects users of EMC RSA Authentication Agent versions 7.0.0, 7.0.1, and 7.0.2.
Yes, CVE-2013-3271 can be exploited remotely by attackers to perform brute-force attacks.