6.4
CVSSv2

CVE-2007-0844

Published: 08/02/2007 Updated: 08/03/2011
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

The auth_via_key function in pam_ssh.c in pam_ssh prior to 1.92, when the allow_blank_passphrase option is disabled, allows remote malicious users to bypass authentication restrictions and use private encryption keys requiring a blank passphrase by entering a non-blank passphrase.

Vulnerable Product Search on Vulmon Subscribe to Product

pam ssh pam ssh 1.91

Vendor Advisories

Debian Bug report logs - #410236 CVE-2007-0844: libpam-ssh: pam_ssh "auth_via_key()" Function Package: libpam-ssh; Maintainer for libpam-ssh is Jerome Benoit <calculus@rezozernet>; Source for libpam-ssh is src:libpam-ssh (PTS, buildd, popcon) Reported by: Alex de Oliveira Silva <enerv@hostsk> Date: Thu, 8 Feb 2007 ...
Debian Bug report logs - #535877 CVE-2009-1273: user enumeration issue in libpam-ssh Package: libpam-ssh; Maintainer for libpam-ssh is Jerome Benoit <calculus@rezozernet>; Source for libpam-ssh is src:libpam-ssh (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode> Date: Sun, 5 Jul 2009 18:36:01 UTC ...