FreeBSD : FreeBSD -- pam_ssh() does not validate service names (e51d5b1a-4638-11e1-9f47-00e0815b8da8)

medium Nessus Plugin ID 57740

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Some third-party applications, including KDE's kcheckpass command, allow the user to specify the name of the policy on the command line.
Since OpenPAM treats the policy name as a path relative to /etc/pam.d or /usr/local/etc/pam.d, users who are permitted to run such an application can craft their own policies and cause the application to load and execute their own modules.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?afdf4b07

Plugin Details

Severity: Medium

ID: 57740

File Name: freebsd_pkg_e51d5b1a463811e19f4700e0815b8da8.nasl

Version: 1.8

Type: local

Published: 1/31/2012

Updated: 1/6/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:freebsd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/29/2012

Vulnerability Publication Date: 12/23/2011

Reference Information

CVE: CVE-2011-4122

BID: 50607

FreeBSD: SA-11:10.pam