Bug 733322 - (CVE-2011-4120) CVE-2011-4120 pam_yubico: Authentication bypass via NULL password
CVE-2011-4120 pam_yubico: Authentication bypass via NULL password
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20110826,repor...
: Security
Depends On: 751726 751727
Blocks:
  Show dependency treegraph
 
Reported: 2011-08-25 09:28 EDT by Nanakos Chrysostomos
Modified: 2016-09-19 22:48 EDT (History)
7 users (show)

See Also:
Fixed In Version: pam_yubico 2.8
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Patch that solves this major security bug (1.07 KB, application/octet-stream)
2011-08-25 09:28 EDT, Nanakos Chrysostomos
no flags Details

  None (edit)
Description Nanakos Chrysostomos 2011-08-25 09:28:33 EDT
Created attachment 519836 [details]
Patch that solves this major security bug

What steps will reproduce the problem?
1. When pressing Ctrl-D when Yubico PAM Module prompts for password.

What is the expected output? What do you see instead?

It just login without asking password


What version of the product are you using? On what operating system?

Linux OS. From version 2.4 to 2.7 as I can see


Please provide any additional information below.

Patch included that solves the problem.
Comment 1 Nanakos Chrysostomos 2011-08-29 06:46:45 EDT
Released version 2.8 that resolves the issue.
Comment 2 Paul DeStefano 2011-09-15 11:42:10 EDT
This is pretty frightening.  I'm happy to report I cannot reproduce it, however.  Perhaps someone could include more details about PAM config that reproduces it.  If this bug has also be reported upstream, please post a link.
Comment 3 Jan Lieskovsky 2011-11-07 05:57:31 EST
I am going to steal this bug to be Security Response product.
Comment 4 Jan Lieskovsky 2011-11-07 06:03:48 EST
A security flaw was found in the way pam_yubico, a pluggable authentication module for yubikeys, performed user authentication, when 'use_first_pass' PAM configuration options was not used and pam_yubico module was configured as 'sufficient' in the PAM configuration.
A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question by providing a NULL value (pressing Ctrl-D keyboard sequence) as the password string.

Relevant upstream patch:
[1] https://github.com/Yubico/yubico-pam/commit/4712da70cac159d5ca9579c1e4fac0645b674043

References:
[2] http://groups.google.com/group/yubico-devel/browse_thread/thread/3f179ec0e6845deb
Comment 5 Jan Lieskovsky 2011-11-07 06:08:15 EST
This issue affects the versions of the pam_yubico package, as shipped with Fedora release of 14 and 15. Please schedule an update.

--

This issue affects the versions of the pam_yubico package, as shipped with Fedora EPEL release 5 and Fedora EPEL release 6. Please schedule an update.
Comment 6 Jan Lieskovsky 2011-11-07 06:11:00 EST
Created pam_yubico tracking bugs for this issue

Affects: fedora-all [bug 751726]
Affects: epel-all [bug 751727]
Comment 7 Jan Lieskovsky 2011-11-07 06:17:14 EST
CVE request:
[3] http://www.openwall.com/lists/oss-security/2011/11/07/5
Comment 8 Jan Lieskovsky 2011-11-07 10:57:16 EST
CVE identifier of CVE-2011-4120 has been assigned to this issue:
[4] http://www.openwall.com/lists/oss-security/2011/11/07/6
Comment 9 Fedora Update System 2011-12-12 16:54:31 EST
yubikey-val-2.10-1.fc16, pam_yubico-2.8-1.fc16, ykclient-2.6-1.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 10 andreas.lindqvist 2013-05-16 10:37:45 EDT
The yubikey software packages in EPEL5 is still outdated.

pam_yubico-2.4-1.el5.i386.rpm                                             24-Feb-2011 17:53   17K  RPM Package
pam_yubico-2.4-1.el5.x86_64.rpm                                           24-Feb-2011 17:53   17K  RPM Package

ykclient-2.3-1.el5.i386.rpm                                               08-Jul-2009 04:02   20K  RPM Package
ykclient-2.3-1.el5.x86_64.rpm                                             08-Jul-2009 04:02   19K  RPM Package

I request new packages to be built for EPEL5.

Note You need to log in before you can comment on or make changes to this bug.