oath-toolkit-help
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[OATH-Toolkit-help] Bug#742140: libpam-oath: PAM module does not check w


From: Andreas Barth
Subject: [OATH-Toolkit-help] Bug#742140: libpam-oath: PAM module does not check whether strdup allocations succeeded
Date: Thu, 6 Nov 2014 15:42:01 +0100
User-agent: Mutt/1.5.18 (2008-05-17)

Hi,

we have the following debian bug report about an security isuse in
libpam-oath (source oath-toolkit, upstream web page
http://www.nongnu.org/oath-toolkit/ ).

What is the appropriate process to get an CVE number on it? This issue
is already public, as it is documented in the debian bug tracking
system.


Andi

* Eero Häkkinen (address@hidden) [141106 14:31]:
> Package: libpam-oath
> Version: 2.0.2-2
> Severity: grave
> Tags: security upstream patch
> 
> The OATH Toolkit PAM module does not check whether strdup allocations 
> succeeded. This may result in null pointer dereference and application 
> crash.
> 
> Depending on the use of the PAM module, this may be remotely exploitable.

> diff --git a/pam_oath/pam_oath.c b/pam_oath/pam_oath.c
> index 8379358..e2d3363 100644
> --- a/pam_oath/pam_oath.c
> +++ b/pam_oath/pam_oath.c
> @@ -146,6 +146,12 @@ pam_sm_authenticate (pam_handle_t * pamh,
>    char *query_prompt = NULL;
>    char *onlypasswd = strdup ("");    /* empty passwords never match */
>  
> +  if (!onlypasswd)
> +    {
> +      retval = PAM_BUF_ERR;
> +      goto done;
> +    }
> +
>    parse_cfg (flags, argc, argv, &cfg);
>  
>    retval = pam_get_user (pamh, &user, NULL);
> @@ -265,6 +271,11 @@ pam_sm_authenticate (pam_handle_t * pamh,
>      {
>        free (onlypasswd);
>        onlypasswd = strdup (password);
> +      if (!onlypasswd)
> +        {
> +          retval = PAM_BUF_ERR;
> +          goto done;
> +        }
>  
>        /* user entered their system password followed by generated OTP? */
>  



reply via email to

[Prev in Thread] Current Thread [Next in Thread]