Bug 166164 - CAN-2005-2641 pam_ldap policy vulnerability
Summary: CAN-2005-2641 pam_ldap policy vulnerability
Keywords:
Status: CLOSED CANTFIX
Alias: None
Product: Fedora Legacy
Classification: Retired
Component: nss_ldap
Version: fc4
Hardware: All
OS: Linux
medium
low
Target Milestone: ---
Assignee: Nalin Dahyabhai
QA Contact:
URL:
Whiteboard: impact=low,embargoed=yes,source=redha...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-08-17 18:19 UTC by Josh Bressers
Modified: 2007-04-18 17:30 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-04-10 19:40:17 UTC
Embargoed:


Attachments (Terms of Use)

Description Josh Bressers 2005-08-17 18:19:08 UTC
+++ This bug was initially created as a clone of Bug #166163 +++

This issue was discovered by Luke Howard

The text was scavanged from his CERT submission


Please describe the vulnerability.
- ----------------------------------

This vulnerability was introduced in pam_ldap-169, which included
preliminary support for draft-behera-ldap-password-policy-07.txt.

If a pam_ldap client authenticates against an LDAP server that
returns a passwordPolicyResponse control, but omits the optional
"error" field of the PasswordPolicyResponseValue, then the LDAP
authentication result will be ignored and the authentication
step will always succeed.

While any password policy error should be propagated to the
account management (authorization) step, under no circumstance
should the absence of the error field override the BindResponse
resultCode.

A fix that corrects this will be available in pam_ldap-180,
available from www.padl.com/OSS/pam_ldap.html.

What is the impact of this vulnerability?
- -----------------------------------------
 (For example: local user can gain root/privileged access, intruders
  can create root-owned files, denial of service attack,  etc.)

   a) What is the specific impact:

When pam_ldap is configured against a directory server that returns
the passwordPolicyResponse control in a BindResponse with no error
field, any user will be allowed to logon to the local system,
regardless of whether the underlying BindRequest succeeded.

This behaviour is likely to occur consistently, so one would expect
it to be noticed during the provisioning of the pam_ldap module.

   b) How would you envision it being used in an attack scenario:

One could exploit this by removing the error field from the encoded
passwordPolicyResponse on the wire if integrity protection is not
used on the underlying LDAP connection. However, this would be
contrary to the best practices for deploying pam_ldap (integrity
and confidentiality should be used). If integrity and confidentiality
protection are not used, then more trivial MITM attacks exist.

Otherwise, a competent system administrator deploying pam_ldap
with an LDAP server that triggers this vulnerability would likely
notice that all logons succeed during the initial configuration of
the software.

The only potentially dangerous exploit would be if it were
possible for a legitimate client authentication to trigger the
omission of the error field in the passwordPolicyResponse in a
manner which is unlikely to be noticed by an administrator
during the initial configuration of the software.

Comment 1 Josh Bressers 2005-08-17 18:19:48 UTC
This issue should also affect FC3

Comment 2 Josh Bressers 2005-08-22 21:24:25 UTC
Lifting embargo

Comment 3 Matthew Miller 2007-04-10 19:40:17 UTC
Fedora Core 4 is now completely unmaintained. These bugs can't be fixed in that
version. If the issue still persists in current Fedora Core, please reopen.
Thank you, and sorry about this.


Note You need to log in before you can comment on or make changes to this bug.