{"vulnerability": "cve-2019-1952", "sightings": [{"uuid": "12f64b38-2f71-4e8e-92a2-3a1830b01791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19521", "type": "published-proof-of-concept", "source": "https://t.me/secinfosex/25", "content": "CVE-2019-19521 - \u043e\u0431\u0445\u043e\u0434 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 OpenBSD (ldapd/radiusd/smtpd \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c).\n\n\u0420\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u0438\u0437 Qualys \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438  \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 \u043e\u0431\u0435\u0440\u0442\u043a\u0430\u0445 /usr/libexec/auth/login_* \n\n\u041d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 /usr/libexec/auth/login_passwd \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0442\u0430\u043a: \n\nlogin_passwd [-s service] [-v wheel=yes|no] [-v lastchance=yes|no] user\n                  [class]\n\n\u0418 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0435\u0441\u043b\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0442\u044c \u043d\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u044e\u0437\u0435\u0440\u043d\u0435\u0439\u043c -schallenge \u0438\u043b\u0438 -schallenge:passwd, \u0442\u043e \nlogin_passwd\n \u0431\u0435\u0437 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0437\u0430\u0432\u0435\u0440\u0448\u0438\u0442\u0441\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0435\u0439!\n\n\u0412 \u0440\u0435\u043f\u043e\u0440\u0442\u0435 \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u0438 \u043e\u0431\u0445\u043e\u0434 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 smtpd, ldapd \u0438 radiusd, \u043f\u0440\u043e\u0441\u0442\u043e \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u044f \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f -schallenge \n\nsshd, \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0435, \u043d\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d, \u0445\u043e\u0442\u044f \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0433\u043e \u0438 \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n\u26a0\ufe0f\u0427\u0438\u0442\u0430\u0439\u0442\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 https://www.qualys.com/2019/12/04/cve-2019-19521/authentication-vulnerabilities-openbsd.txt\n\n#openbsd #login_passwd", "creation_timestamp": "2019-12-05T10:36:12.000000Z"}, {"uuid": "43c8d391-5917-426b-a275-b2119cdc9a9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19521", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7241", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T11:44:38.000000Z"}, {"uuid": "7d51d672-3108-461e-b3cc-452c819f8e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19522", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7241", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T11:44:38.000000Z"}, {"uuid": "80dd01a4-e7c1-4566-8756-c5d005319386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19520", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7241", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T11:44:38.000000Z"}, {"uuid": "06e4b075-313c-4019-a534-b4153cade9ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19520", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/550", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T12:42:53.000000Z"}, {"uuid": "0fab5090-523d-49b8-8745-3b2cf3570d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19521", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/550", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T12:42:53.000000Z"}, {"uuid": "5d5c653c-ce7e-4e00-a2fc-be15005c5648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19522", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/550", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T12:42:53.000000Z"}, {"uuid": "efa847ca-ab6e-4837-8bba-0a9a0e4c818f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19529", "type": "seen", "source": "https://t.me/ctinow/202154", "content": "https://ift.tt/Yf0ak1x\nCVE-2019-19529 | Linux Kernel up to 5.3.10 USB Device mcba_usb.c use after free (USN-4225-1)", "creation_timestamp": "2024-03-07T07:32:03.000000Z"}, {"uuid": "7aabf6a1-0e0b-4d7f-88bc-eb7ebfa73019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19528", "type": "seen", "source": "https://t.me/ctinow/202153", "content": "https://ift.tt/uwlZbkS\nCVE-2019-19528 | Linux Kernel up to 5.3.6 USB Device iowarrior.c use after free", "creation_timestamp": "2024-03-07T07:32:02.000000Z"}, {"uuid": "e9015ce2-6f25-4da1-b0aa-7e0e6f6395fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19525", "type": "seen", "source": "https://t.me/ctinow/202121", "content": "https://ift.tt/hOxvpKw\nCVE-2019-19525 | Linux Kernel up to 5.3.5 USB Device atusb.c use after free (DLA 2114-1)", "creation_timestamp": "2024-03-07T06:36:31.000000Z"}, {"uuid": "0d1b8991-fd25-4854-927a-7e103f4028f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19522", "type": "seen", "source": "https://t.me/ctinow/202414", "content": "https://ift.tt/TRFgQfp\nCVE-2019-19522 | OpenBSD 6.6 S-Key/Yubikey improper authentication (ID 155572)", "creation_timestamp": "2024-03-07T14:11:58.000000Z"}, {"uuid": "22ec201d-a408-4c82-bf04-74730151c0d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19521", "type": "seen", "source": "https://t.me/ctinow/202391", "content": "https://ift.tt/7rfzCAG\nCVE-2019-19521 | OpenBSD 6.6 libc gen/auth_subr.c Username improper authentication (ID 155572)", "creation_timestamp": "2024-03-07T13:41:39.000000Z"}, {"uuid": "8286b673-1fc2-4351-83f3-f11a60a28198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19520", "type": "seen", "source": "https://t.me/ctinow/202390", "content": "https://ift.tt/sKXdkHE\nCVE-2019-19520 | OpenBSD 6.6 xlock loader.c LIBGL_DRIVERS_PATH privileges management (ID 155572)", "creation_timestamp": "2024-03-07T13:41:38.000000Z"}, {"uuid": "674263f5-4119-446f-9a1f-c67ffb25bc23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19523", "type": "seen", "source": "https://t.me/ctinow/200658", "content": "https://ift.tt/oPZW1HK\nCVE-2019-19523 | Linux Kernel up to 5.3.6 USB Device adutux.c use after free (DLA 2068-1)", "creation_timestamp": "2024-03-05T20:22:10.000000Z"}, {"uuid": "834a0668-c2a4-4c33-bfd9-b4e7bd740d64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19527", "type": "seen", "source": "https://t.me/ctinow/202135", "content": "https://ift.tt/qPxuvfw\nCVE-2019-19527 | Linux Kernel up to 5.2.9 USB Device hiddev.c use after free (DLA 2068-1)", "creation_timestamp": "2024-03-07T07:02:32.000000Z"}, {"uuid": "231cafc3-cdd8-49ed-ae02-ef90798f8499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19526", "type": "seen", "source": "https://t.me/ctinow/202134", "content": "https://ift.tt/q6etC2z\nCVE-2019-19526 | Linux Kernel up to 5.3.8 USB Device drivers/nfc/pn533/usb.c use after free (USN-4226-1)", "creation_timestamp": "2024-03-07T07:02:31.000000Z"}, {"uuid": "7913b665-3020-4fdb-aa97-9ea64cd472db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19521", "type": "seen", "source": "https://t.me/cibsecurity/8515", "content": "\u274c OpenBSD Hit with Authentication, LPE Bugs \u274c\n\nThe authentication bypass (CVE-2019-19521) is remotely exploitable.\n\n\ud83d\udcd6 Read\n\nvia \"Threatpost\".", "creation_timestamp": "2019-12-05T17:12:16.000000Z"}, {"uuid": "17ad4537-a6f5-47b1-bcd8-81b0e19fe9f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19521", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/467", "content": "#Threat_Research\n1. OPERATION SOFT CELL:\nA Worldwide Campaign Against Telecommunications Providers\nhttps://www.cybereason.com/blog/operation-soft-cell-a-worldwide-campaign-against-telecommunications-providers\n2. OpenBSD Authentication Bypass and Privilege Escalation Vulnerability\nhttps://www.qualys.com/2019/12/04/cve-2019-19521/authentication-vulnerabilities-openbsd.txt?_ga=2.58244398.587934852.1575530822-682141427.1570559125", "creation_timestamp": "2024-10-15T17:51:04.000000Z"}]}