Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2013-7322

Overview

Vulnerability Score 4.9 4.9
CVE Id CVE-2013-7322
Last Modified 10 Mar 2014 11:33:27
Published 09 Mar 2014 09:16:56
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication SINGLE_INSTANCE

CVE-2013-7322

Summary

usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath.

Vulnerable Systems

Application

  • Nongnu Oath Toolkit 1.0.0

  • Nongnu Oath Toolkit 1.0.1

  • Nongnu Oath Toolkit 1.10.0

  • Nongnu Oath Toolkit 1.10.1

  • Nongnu Oath Toolkit 1.10.2

  • Nongnu Oath Toolkit 1.10.3

  • Nongnu Oath Toolkit 1.10.4

  • Nongnu Oath Toolkit 1.10.5

  • Nongnu Oath Toolkit 1.12.0

  • Nongnu Oath Toolkit 1.12.1

  • Nongnu Oath Toolkit 1.12.2

  • Nongnu Oath Toolkit 1.12.3

  • Nongnu Oath Toolkit 1.12.4

  • Nongnu Oath Toolkit 1.12.5

  • Nongnu Oath Toolkit 1.12.6

  • Nongnu Oath Toolkit 1.2.0

  • Nongnu Oath Toolkit 1.2.1

  • Nongnu Oath Toolkit 1.2.2

  • Nongnu Oath Toolkit 1.4.0

  • Nongnu Oath Toolkit 1.4.1

  • Nongnu Oath Toolkit 1.4.2

  • Nongnu Oath Toolkit 1.4.3

  • Nongnu Oath Toolkit 1.4.4

  • Nongnu Oath Toolkit 1.4.5

  • Nongnu Oath Toolkit 1.4.6

  • Nongnu Oath Toolkit 1.6.0

  • Nongnu Oath Toolkit 1.6.1

  • Nongnu Oath Toolkit 1.6.2

  • Nongnu Oath Toolkit 1.6.3

  • Nongnu Oath Toolkit 1.6.4

  • Nongnu Oath Toolkit 1.8.0

  • Nongnu Oath Toolkit 1.8.1

  • Nongnu Oath Toolkit 1.8.2

  • Nongnu Oath Toolkit 2.0.0

  • Nongnu Oath Toolkit 2.0.1

  • Nongnu Oath Toolkit 2.0.2

  • Nongnu Oath Toolkit 2.2.0

  • Nongnu Oath Toolkit 2.4.0


References

XF - oath-toolkit-cve20137322-replay(91316)

CONFIRM - http://www.nongnu.org/oath-toolkit/NEWS.html

MLIST - [oss-security] 20140209 Re: oath-toolkit PAM module OTP token invalidation issue

MLIST - [OATH-Toolkit-help] 20131214 Re: libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?

MLIST - [OATH-Toolkit-help] 20131209 libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?


Last Updated: 27 May 2016 11:04:36