|
Message-Id: <201312092348.rB9NmC46029070@linus.mitre.org> Date: Mon, 9 Dec 2013 18:48:12 -0500 (EST) From: cve-assign@...re.org To: ratulg@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: pam: password hashes aren't compared case-sensitively -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > https://bugzilla.redhat.com/show_bug.cgi?id=1038555 > > It was found that in pam_userdb module for Pam, password hashes weren't > compared case-sensitively, which could lead to acceptance of hashes for > completely different passwords, which shouldn't be accepted. > > After hashing the user's password with crypt(), pam_userdb compares the > result to the stored hash case-insensitively with strncasecmp(), which > should be avoided, as it could result in an increased possibility of a > successful brute-force attack. Use CVE-2013-7041. Just for clarification, this refers to case sensitivity of password hashes, not case sensitivity of cleartext passwords. It could conceivably be legitimate for a product to process cleartext passwords on Linux in a case-insensitive way (perhaps for compatibility with another system on which passwords are supposed to be case-insensitive). There doesn't seem to be any plausible reason for supporting case-insensitivity of password hashes. A legitimate user isn't going to try a password that hashes to one of the differently cased values. We also looked at other comments about this issue but did not assign additional CVE IDs: > From: Solar Designer <solar@...nwall.com> > Message-ID: <20131209123945.GA16680@...nwall.com> > a length comparison of the computed vs. stored hash should have been added This seems to be a suggested security improvement to address the possibility of a system that contained stored hashes with invalid lengths. We would not consider this a vulnerability fix in the traditional sense. > correct passwords may possibly be determined remotely in linear rather > than exponential time (as function of password length): > > Additionally, the length comparison, while having it is crucial, leaks > even more timing information: it tells a remote attacker whether the > tested password length is correct or not. Again, there is a possible security improvement to address computation-time information leaks that were not considered during the product design. We would not consider this a vulnerability fix in the traditional sense unless the product tried to prevent such leaks but had an implementation error. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJSplL+AAoJEKllVAevmvms9AcIAIUfLGRdvnbmF5Dn150qmv2e OOXR1tvoaPZBlU/LIuLCLZVUTkjpY9rvla8CFrtuGwTMX9/5XjpujYzkwTovSCyp +e2jGv2dz/fcsQ7Ul0SVmIxNmxfGaOXaykphyNhiC5jrefHQrCvolb21WJxC5y+9 ohdPUSjykBkrmV3aMk9TOn9Z1jxI1fb9douh+RqPvj0TmNwkjX9iMWOEnYjE+Sk6 eXBvqv4e3RPHOa0kpUH2MvLxWD383NG8ttsU3pyTLARPgViNpWCGRb2Wt+fJgZT6 rwi2gCS8NUY+kT9oQL1b7NLlUmjRdThHZwSMpHPoQ79T49dV67TpOnqYI0IrtCw= =46gA -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.