Vulnerability Details : CVE-2009-1384
pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
Vulnerability category: BypassGain privilege
Products affected by CVE-2009-1384
- cpe:2.3:a:eyrie:pam-krb5:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.3.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-1384
0.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-1384
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2009-1384
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-1384
-
Red Hat 2010-03-31This issue did not affect the versions of the pam_krb5 packages, as shipped with Red Hat Enterprise Linux 3 and 4. The issue was addressed in the pam_krb5 packages as shipped with Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2010-0258.html
References for CVE-2009-1384
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7081
-
https://bugzilla.redhat.com/show_bug.cgi?id=502602
Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:054
-
http://www.openwall.com/lists/oss-security/2009/05/27/1
-
http://www.vupen.com/english/advisories/2009/1448
-
http://www.securityfocus.com/bid/35112
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9652
-
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
VMSA-2011-0003.2
-
http://www.securityfocus.com/archive/1/516397/100/0/threaded
SecurityFocus
Jump to