5
CVSSv2

CVE-2015-0885

Published: 28/02/2015 Updated: 24/09/2015
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

checkpw 1.02 and previous versions allows remote malicious users to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 7.0

checkpw project checkpw

Vendor Advisories

Debian Bug report logs - #780139 CVE-2015-0885 Package: checkpw; Maintainer for checkpw is Gerrit Pape <pape@smardenorg>; Source for checkpw is src:checkpw (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 9 Mar 2015 17:03:02 UTC Severity: grave Tags: fixed-upstream, patch, security ...
Hiroya Ito of GMO Pepabo, Inc reported that checkpw, a password authentication program, has a flaw in processing account names which contain double dashes A remote attacker can use this flaw to cause a denial of service (infinite loop) For the stable distribution (wheezy), this problem has been fixed in version 102-1+deb7u1 For the upcoming st ...