CERTA-2008-AVI-379

Vulnerability from certfr_avis - Published: 2008-07-28 - Updated: 2008-07-28

Une vulnérabilité dans une bibliothèque du système d'exploitation openSUSE permet à un utilisateur malveillant de contourner la politique de sécurité.

Description

La bibliothèque libxcrypt du système d'exploitation openSUSE fait appel à l'agorithme de chiffrement DES pour calculer les condesés des mots de passe quand la configuration prescrit l'algorithme MD5. Cette vulnérabilité amoindrit la protection des mots de passe. Elle permet à un utilisateur malveillant de contourner la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Après application du correctif, il est nécessaire de changer tous les mots de passe.

openSUSE, version 11.0.

Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cSPAN class=\"textit\"\u003eopenSUSE\u003c/SPAN\u003e,  version 11.0.",
  "content": "## Description\n\nLa biblioth\u00e8que libxcrypt du syst\u00e8me d\u0027exploitation openSUSE fait appel\n\u00e0 l\u0027agorithme de chiffrement DES pour calculer les condes\u00e9s des mots de\npasse quand la configuration prescrit l\u0027algorithme MD5. Cette\nvuln\u00e9rabilit\u00e9 amoindrit la protection des mots de passe. Elle permet \u00e0\nun utilisateur malveillant de contourner la politique de s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\n  \n  \n\nApr\u00e8s application du correctif, il est n\u00e9cessaire de changer tous les\nmots de passe.\n",
  "cves": [
    {
      "name": "CVE-2008-3188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3188"
    }
  ],
  "initial_release_date": "2008-07-28T00:00:00",
  "last_revision_date": "2008-07-28T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 openSUSE du 21 juillet 2008 :",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00008.html"
    }
  ],
  "reference": "CERTA-2008-AVI-379",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-07-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans une biblioth\u00e8que du syst\u00e8me d\u0027exploitation \u003cspan\nclass=\"textit\"\u003eopenSUSE\u003c/span\u003e permet \u00e0 un utilisateur malveillant de\ncontourner la politique de s\u00e9curit\u00e9.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de openSUSE",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "CVE-2008-3188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3188"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…