{"vulnerability": "CVE-2019-19521", "sightings": [{"uuid": "12f64b38-2f71-4e8e-92a2-3a1830b01791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19521", "type": "published-proof-of-concept", "source": "https://t.me/secinfosex/25", "content": "CVE-2019-19521 - \u043e\u0431\u0445\u043e\u0434 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 OpenBSD (ldapd/radiusd/smtpd \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c).\n\n\u0420\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u0438\u0437 Qualys \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438  \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 \u043e\u0431\u0435\u0440\u0442\u043a\u0430\u0445 /usr/libexec/auth/login_* \n\n\u041d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 /usr/libexec/auth/login_passwd \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0442\u0430\u043a: \n\nlogin_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user\n                  [class]\n\n\u0418 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0435\u0441\u043b\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0442\u044c \u043d\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u044e\u0437\u0435\u0440\u043d\u0435\u0439\u043c -schallenge \u0438\u043b\u0438 -schallenge:passwd, \u0442\u043e \nlogin_passwd\n \u0431\u0435\u0437 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0437\u0430\u0432\u0435\u0440\u0448\u0438\u0442\u0441\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0435\u0439!\n\n\u0412 \u0440\u0435\u043f\u043e\u0440\u0442\u0435 \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u0438 \u043e\u0431\u0445\u043e\u0434 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 smtpd, ldapd \u0438 radiusd, \u043f\u0440\u043e\u0441\u0442\u043e \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u044f \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f -schallenge \n\nsshd, \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0435, \u043d\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d, \u0445\u043e\u0442\u044f \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0433\u043e \u0438 \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n\u26a0\ufe0f\u0427\u0438\u0442\u0430\u0439\u0442\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 https://www.qualys.com/2019/12/04/cve-2019-19521/authentication-vulnerabilities-openbsd.txt\n\n#openbsd #login_passwd", "creation_timestamp": "2019-12-05T10:36:12.000000Z"}, {"uuid": "0fab5090-523d-49b8-8745-3b2cf3570d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19521", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/550", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T12:42:53.000000Z"}, {"uuid": "22ec201d-a408-4c82-bf04-74730151c0d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19521", "type": "seen", "source": "https://t.me/ctinow/202391", "content": "https://ift.tt/7rfzCAG\nCVE-2019-19521 | OpenBSD 6.6 libc gen/auth_subr.c Username improper authentication (ID 155572)", "creation_timestamp": "2024-03-07T13:41:39.000000Z"}, {"uuid": "17ad4537-a6f5-47b1-bcd8-81b0e19fe9f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19521", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/467", "content": "#Threat_Research\n1. OPERATION SOFT CELL:\nA Worldwide Campaign Against Telecommunications Providers\nhttps://www.cybereason.com/blog/operation-soft-cell-a-worldwide-campaign-against-telecommunications-providers\n2. OpenBSD Authentication Bypass and Privilege Escalation Vulnerability\nhttps://www.qualys.com/2019/12/04/cve-2019-19521/authentication-vulnerabilities-openbsd.txt?_ga=2.58244398.587934852.1575530822-682141427.1570559125", "creation_timestamp": "2024-10-15T17:51:04.000000Z"}, {"uuid": "7913b665-3020-4fdb-aa97-9ea64cd472db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19521", "type": "seen", "source": "https://t.me/cibsecurity/8515", "content": "\u274c OpenBSD Hit with Authentication, LPE Bugs \u274c\n\nThe authentication bypass (CVE-2019-19521) is remotely exploitable.\n\n\ud83d\udcd6 Read\n\nvia \"Threatpost\".", "creation_timestamp": "2019-12-05T17:12:16.000000Z"}, {"uuid": "43c8d391-5917-426b-a275-b2119cdc9a9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19521", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7241", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T11:44:38.000000Z"}]}