Vulnerabilidad en libuser (CVE-2011-0002)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-310
Errores criptográficos
Fecha de publicación:
22/01/2011
Última modificación:
11/04/2025
Descripción
libuser en versiones anteriores a la 0.57 usa la contraseña en texto claro (1) !! o (2) x para cuentas de usuario LDAP nuevas, lo que facilita a atacantes remotos obtener acceso especificando uno de estos valores.
Impacto
Puntuación base 2.0
6.40
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:miloslav_trmac:libuser:*:*:*:*:*:*:*:* | 0.56.18 (incluyendo) | |
| cpe:2.3:a:miloslav_trmac:libuser:0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.8.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:miloslav_trmac:libuser:0.16.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053365.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053378.html
- http://secunia.com/advisories/42891
- http://secunia.com/advisories/42966
- http://secunia.com/advisories/43047
- http://securitytracker.com/id?1024960=
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A019
- http://www.osvdb.org/70421
- http://www.redhat.com/support/errata/RHSA-2011-0170.html
- http://www.securityfocus.com/bid/45791
- http://www.vupen.com/english/advisories/2011/0184
- http://www.vupen.com/english/advisories/2011/0201
- http://www.vupen.com/english/advisories/2011/0226
- https://bugzilla.redhat.com/show_bug.cgi?id=643227
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64677
- https://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053365.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053378.html
- http://secunia.com/advisories/42891
- http://secunia.com/advisories/42966
- http://secunia.com/advisories/43047
- http://securitytracker.com/id?1024960=
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A019
- http://www.osvdb.org/70421
- http://www.redhat.com/support/errata/RHSA-2011-0170.html
- http://www.securityfocus.com/bid/45791
- http://www.vupen.com/english/advisories/2011/0184
- http://www.vupen.com/english/advisories/2011/0201
- http://www.vupen.com/english/advisories/2011/0226
- https://bugzilla.redhat.com/show_bug.cgi?id=643227
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64677
- https://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57



