7.5
CVSSv2

CVE-2005-3532

Published: 11/12/2005 Updated: 03/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

authpam.c in courier-authdaemon for Courier Mail Server 0.37.3 up to and including 0.52.1, when using pam_tally, does not call the pam_acct_mgmt function to verify that access should be granted, which allows malicious users to authenticate to the server using accounts that have been disabled.

Vulnerable Product Search on Vulmon Subscribe to Product

double precision incorporated courier mail server 0.48

double precision incorporated courier mail server 0.46

double precision incorporated courier mail server 0.47

double precision incorporated courier mail server 0.37.3

double precision incorporated courier mail server 0.50.0

double precision incorporated courier mail server 0.52.1

double precision incorporated courier mail server 0.48.1

double precision incorporated courier mail server 0.48.2

double precision incorporated courier mail server 0.49.0

Vendor Advisories

Debian Bug report logs - #211920 pam authentication module does not call pam_acct_mgmt Package: courier-authdaemon; Maintainer for courier-authdaemon is Markus Wanner <markus@bluegapch>; Source for courier-authdaemon is src:courier-authlib (PTS, buildd, popcon) Reported by: Patrick Cheong Shu Yang <shuyang@popjaringmy& ...
Patrick Cheong Shu Yang discovered a flaw in the user account handling of courier-authdaemon After successful authorization, the Courier mail server granted access to deactivated accounts ...
Patrick Cheong Shu Yang discovered that courier-authdaemon, the authentication daemon of the Courier Mail Server, grants access to accounts that are already deactivated For the old stable distribution (woody) this problem has been fixed in version 0373-28 For the stable distribution (sarge) this problem has been fixed in version 047-4sarge4 ...