First published: Fri Feb 08 2019(Updated: )
An issue was discovered in gsi-openssh-server 7.9p1 on Fedora 29. If PermitPAMUserChange is set to yes in the /etc/gsissh/sshd_config file, logins succeed with a valid username and an incorrect password, even though a failure entry is recorded in the /var/log/messages file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora | =28 | |
Red Hat Fedora | =29 | |
OpenSSH | =7.9-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7639 is considered a moderate severity vulnerability due to its potential for unauthorized access.
To fix CVE-2019-7639, you should set PermitPAMUserChange to no in the /etc/gsissh/sshd_config configuration file.
CVE-2019-7639 affects gsi-openssh-server version 7.9p1 on Fedora versions 28 and 29.
CVE-2019-7639 allows successful logins with an incorrect password if PermitPAMUserChange is enabled, compromising user authentication.
A temporary workaround for CVE-2019-7639 is to disable the PermitPAMUserChange setting until an update is applied.