First published: Fri Jun 05 2015(Updated: )
From the original report: "If SELinux is enabled, the _unix_run_helper_binary function in Linux-PAM 1.1.8 and earlier hangs indefinitely when verifying a password of 65536 characters, which allows attackers to conduct username enumeration and denial of service attacks. When supplying a password of 65536 characters or more, the process will block on the write(2) call at modules/pam_unix/support.c:614 because it tries to write strlen(passwd)+1 bytes to a blocking pipe and a pipe has a limited capacity of 65536 bytes on Linux." Acknowledgements: Red Hat would like to thank Sebastien Macke of Trustwave SpiderLabs for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux-pam Linux-pam | <=1.1.8 | |
Oracle Sparc-opl Service Processor | <=1121 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.