Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
PAM-PKCS#11 vulnerable to authentication bypass with default value for `cert_policy` (`none`)
Vulnerability Description
PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token. The default to *not* check the private key's signature has been changed with commit commi6638576892b59a99389043c90a1e7dd4d783b921, so that all versions starting with pam_pkcs11-0.6.0 should be affected. As a workaround, in `pam_pkcs11.conf`, set at least `cert_policy = signature;`.
CVSS Information
N/A
Vulnerability Type
认证机制不恰当
Vulnerability Title
PAM-PKCS#11 授权问题漏洞
Vulnerability Description
PAM-PKCS#11是OpenSC开源的一个登录模块。 PAM-PKCS#11 0.6.13之前版本存在授权问题漏洞,该漏洞源于默认配置下不检查私钥签名,允许攻击者用用户的公开数据创建新令牌并登录。
CVSS Information
N/A
Vulnerability Type
N/A