CVE-2007-0844: libpam-ssh: pam_ssh "auth_via_key()" Function

Related Vulnerabilities: CVE-2007-0844   cve-2007-0844  

Debian Bug report logs - #410236
CVE-2007-0844: libpam-ssh: pam_ssh "auth_via_key()" Function

version graph

Reported by: Alex de Oliveira Silva <enerv@host.sk>

Date: Thu, 8 Feb 2007 19:48:08 UTC

Severity: important

Tags: patch, security

Merged with 439150

Found in version libpam-ssh/1.91.0-9.1

Fixed in version libpam-ssh/1.91.0-9.2

Done: Nico Golde <nion@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Aurelien Labrosse <aurelien.labrosse@free.fr>:
Bug#410236; Package libpam-ssh. (full text, mbox, link).


Acknowledgement sent to Alex de Oliveira Silva <enerv@host.sk>:
New Bug report received and forwarded. Copy sent to Aurelien Labrosse <aurelien.labrosse@free.fr>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Alex de Oliveira Silva <enerv@host.sk>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2007-0844: libpam-ssh: pam_ssh "auth_via_key()" Function
Date: Thu, 08 Feb 2007 16:11:45 -0300
Package: libpam-ssh
Version: 1.91.0-9.1
Severity: important
Tags: security

The auth_via_key function in pam_ssh.c in pam_ssh before 1.92, when the
allow_blank_passphrase option is disabled, allows remote attackers to
bypass authentication restrictions and use private encryption keys
requiring a blank passphrase by entering a non-blank passphrase.

Reference:
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0844
http://sourceforge.net/project/shownotes.php?release_id=484376
http://secunia.com/advisories/24061

Note:
Please mention the CVE id in the changelog.



regards,
-- 
   .''`.  
  : :' :    Alex de Oliveira Silva | enerv
  `. `'     www.enerv.net
    `- 



Information forwarded to debian-bugs-dist@lists.debian.org, Aurelien Labrosse <aurelien.labrosse@free.fr>:
Bug#410236; Package libpam-ssh. (full text, mbox, link).


Acknowledgement sent to Tobias Klauser <tklauser@access.unizh.ch>:
Extra info received and forwarded to list. Copy sent to Aurelien Labrosse <aurelien.labrosse@free.fr>. (full text, mbox, link).


Message #10 received at 410236@bugs.debian.org (full text, mbox, reply):

From: Tobias Klauser <tklauser@access.unizh.ch>
To: 410236@bugs.debian.org
Cc: control@bugs.debian.org
Subject: Patch to fix CVE-2007-0844 taken from upstream version 1.92
Date: Fri, 17 Aug 2007 16:45:59 +0200
[Message part 1 (text/plain, inline)]
tags 410236 +patch
thanks

Hi,

Attached is a patch which incorporates the change taken from upstream version
1.92 into the package. The only change between 1.91 and 1.92 was to fix this
issue. Updating the package to the new upstream version might thus be more
worthwile than applying the patch.

As I'm not a Debian Developer and thus not able to do it myself any DD
might want to use this for an NMU.

Cheers, Tobias
[signature.asc (application/pgp-signature, inline)]

Tags added: patch Request was from Tobias Klauser <tklauser@access.unizh.ch> to control@bugs.debian.org. (Fri, 17 Aug 2007 14:48:02 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Aurelien Labrosse <aurelien.labrosse@free.fr>:
Bug#410236; Package libpam-ssh. (full text, mbox, link).


Acknowledgement sent to Tobias Klauser <tklauser@access.unizh.ch>:
Extra info received and forwarded to list. Copy sent to Aurelien Labrosse <aurelien.labrosse@free.fr>. (full text, mbox, link).


Message #17 received at 410236@bugs.debian.org (full text, mbox, reply):

From: Tobias Klauser <tklauser@access.unizh.ch>
To: 410236@bugs.debian.org
Subject: Actual patch (was: Patch to fix CVE-2007-0844 taken from upstream version 1.92)
Date: Fri, 17 Aug 2007 16:54:17 +0200
[Message part 1 (text/plain, inline)]
Sorry, I forgot to add the patch.

Thanks, Tobias
[cve-2007-0844.diff (text/x-diff, attachment)]
[signature.asc (application/pgp-signature, inline)]

Merged 410236 439150. Request was from Nico Golde <nion@debian.org> to control@bugs.debian.org. (Thu, 30 Aug 2007 15:12:04 GMT) (full text, mbox, link).


Reply sent to Nico Golde <nion@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Alex de Oliveira Silva <enerv@host.sk>:
Bug acknowledged by developer. (full text, mbox, link).


Message #24 received at 410236-close@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: 410236-close@bugs.debian.org
Subject: Bug#410236: fixed in libpam-ssh 1.91.0-9.2
Date: Thu, 30 Aug 2007 15:32:07 +0000
Source: libpam-ssh
Source-Version: 1.91.0-9.2

We believe that the bug you reported is fixed in the latest version of
libpam-ssh, which is due to be installed in the Debian FTP archive:

libpam-ssh_1.91.0-9.2.diff.gz
  to pool/main/libp/libpam-ssh/libpam-ssh_1.91.0-9.2.diff.gz
libpam-ssh_1.91.0-9.2.dsc
  to pool/main/libp/libpam-ssh/libpam-ssh_1.91.0-9.2.dsc
libpam-ssh_1.91.0-9.2_i386.deb
  to pool/main/libp/libpam-ssh/libpam-ssh_1.91.0-9.2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 410236@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde <nion@debian.org> (supplier of updated libpam-ssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 30 Aug 2007 16:55:51 +0200
Source: libpam-ssh
Binary: libpam-ssh
Architecture: source i386
Version: 1.91.0-9.2
Distribution: unstable
Urgency: low
Maintainer: Aurelien Labrosse <aurelien.labrosse@free.fr>
Changed-By: Nico Golde <nion@debian.org>
Description: 
 libpam-ssh - enable SSO behavior for ssh and pam
Closes: 410236
Changes: 
 libpam-ssh (1.91.0-9.2) unstable; urgency=low
 .
   * Non-maintainer upload by testing security team.
   * Include 03_fix-CVE-2007-0844 to fix authentication bypass if
     allow_blank_passphrase is enabled (CVE-2007-0844) (Closes: #410236).
   * Included 04_fix_syslogh_inclusion.dpatch to fix missing inclusion
     of syslog headers which lead to FTBFS.
Files: 
 1bc367982e48823fae1b101a0713bc0d 692 admin optional libpam-ssh_1.91.0-9.2.dsc
 184e95cf8e23431a404fd1ab26b576e3 345163 admin optional libpam-ssh_1.91.0-9.2.diff.gz
 81575e2f4eaf37b3065d45c4295a1e08 49352 admin optional libpam-ssh_1.91.0-9.2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG1uDFHYflSXNkfP8RAoykAJ40sIxnahm7V5IRfAPOjG2cjzMn3gCfaMeY
v6xnsd7Znk0Mv+UU502MS+o=
=yDfM
-----END PGP SIGNATURE-----




Reply sent to Nico Golde <nion@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Rafi Rubin <rafi@ugcs.caltech.edu>:
Bug acknowledged by developer. (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Wed, 10 Oct 2007 07:27:48 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:47:17 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.