First published: Wed Dec 04 2019(Updated: )
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openbsd | =6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19521 is a vulnerability in the libc library in OpenBSD 6.6 that allows authentication bypass via the -schallenge username.
CVE-2019-19521 has a severity rating of 9.8, which is considered critical.
OpenBSD 6.6 is the affected version of the software.
The authentication bypass can be exploited by using the -schallenge username in services like smtpd, ldapd, or radiusd.
References for CVE-2019-19521 can be found at the following links: http://packetstormsecurity.com/files/155572/Qualys-Security-Advisory-OpenBSD-Authentication-Bypass-Privilege-Escalation.html, http://seclists.org/fulldisclosure/2019/Dec/14, http://www.openwall.com/lists/oss-security/2019/12/04/5