7.5
CVSSv2

CVE-2019-19521

Published: 05/12/2019 Updated: 12/12/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openbsd openbsd 6.6

Exploits

Qualys has discovered that OpenBSD suffers from multiple authentication bypass and local privilege escalation vulnerabilities ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Authentication vulnerabilities in OpenBSD <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys Security ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Authentication vulnerabilities in OpenBSD <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys Security Advisor ...

Github Repositories

Yet Another Link Repo. Mainly Security Links

Robs-Links Mostly Cybersecurity related, however not all Malware Related Link Description sslblabusech/ Malware related ssl certs githubcom/guardicore/monkey Infection Monkey - Automated testing urlhausabusech/ Malware Repo triage/reports/public Malware Repo Testing Disto Link Description testaspnetvulnwebc