CVE-2011-4120

critical

Description

Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question by providing a NULL value (pressing Ctrl-D keyboard sequence) as the password string.

References

https://www.openwall.com/lists/oss-security/2011/11/07/6

https://security-tracker.debian.org/tracker/CVE-2011-4120

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4120

Details

Source: Mitre, NVD

Published: 2019-11-26

Updated: 2020-08-18

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical