CVE-2013-7322 (GCVE-0-2013-7322)
Vulnerability from cvelistv5 – Published: 2014-03-07 20:00 – Updated: 2024-08-06 18:01
VLAI?
Summary
usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:01:20.390Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20140209 Re: oath-toolkit PAM module OTP token invalidation issue",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://seclists.org/oss-sec/2014/q1/296"
},
{
"name": "[OATH-Toolkit-help] 20131214 Re: libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00003.html"
},
{
"name": "[OATH-Toolkit-help] 20131209 libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00000.html"
},
{
"name": "oath-toolkit-cve20137322-replay(91316)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91316"
},
{
"name": "[OATH-Toolkit-help] 20131214 Re: libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.nongnu.org/oath-toolkit/NEWS.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-12-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20140209 Re: oath-toolkit PAM module OTP token invalidation issue",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://seclists.org/oss-sec/2014/q1/296"
},
{
"name": "[OATH-Toolkit-help] 20131214 Re: libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00003.html"
},
{
"name": "[OATH-Toolkit-help] 20131209 libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00000.html"
},
{
"name": "oath-toolkit-cve20137322-replay(91316)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91316"
},
{
"name": "[OATH-Toolkit-help] 20131214 Re: libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.nongnu.org/oath-toolkit/NEWS.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7322",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20140209 Re: oath-toolkit PAM module OTP token invalidation issue",
"refsource": "MLIST",
"url": "http://seclists.org/oss-sec/2014/q1/296"
},
{
"name": "[OATH-Toolkit-help] 20131214 Re: libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00003.html"
},
{
"name": "[OATH-Toolkit-help] 20131209 libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00000.html"
},
{
"name": "oath-toolkit-cve20137322-replay(91316)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91316"
},
{
"name": "[OATH-Toolkit-help] 20131214 Re: libpam-oath vulnerable to replay of OTP as result of incorrectly parsing comments in users file?",
"refsource": "MLIST",
"url": "http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00002.html"
},
{
"name": "http://www.nongnu.org/oath-toolkit/NEWS.html",
"refsource": "CONFIRM",
"url": "http://www.nongnu.org/oath-toolkit/NEWS.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-7322",
"datePublished": "2014-03-07T20:00:00",
"dateReserved": "2014-02-09T00:00:00",
"dateUpdated": "2024-08-06T18:01:20.390Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.4.0\", \"matchCriteriaId\": \"7F80B2A2-1E9F-4F87-BF6B-48DC1D660ED9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA66EA93-4923-42E5-8760-607899C824D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34D1A236-F2B3-4A4D-9ED3-025FE47CEF70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8E99144-334B-40A7-972A-C82F0EB4A9BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB969EBE-41F0-44F4-947C-3BA0993FE4A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"433AA450-7581-487C-A8F7-66EF20106656\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91ECF732-A101-49D7-B7DB-98CA3ED2A2EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C31F408-DAB1-41D1-B067-578D75753B63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E434BCA0-0E21-4551-A233-BF51ED2CF074\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6F29AAE-E8BE-4A94-9F28-C583D2917767\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"552863FA-A13F-4865-8FB4-6B317EB41344\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1636BEBF-6AC5-438B-9FE6-D86629E02E41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5752F6FE-35C9-4985-9820-7B10578D15A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AA344FC-DD43-47DF-BB99-2CAAEFB4A720\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74FB0520-5805-4AF9-B4DB-C9C17F60D356\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B56A3EB-6093-42D8-8883-893DC55AC4B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B6A266E-4610-4322-BDA1-A6C96FB7C3BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC89697E-0BF0-4F2D-95FC-CC5FBE9A1BEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B12335A5-5D9F-4C97-A769-3786DF182999\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE5898DE-5072-49A1-BEB7-29094496955F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2657D215-C025-46B5-8B8A-2B878EFFA3B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FACE0FD6-29D0-467B-A0CD-8AAE782DA23B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F55F7E1-2EA9-422E-BBAB-BFB5B96BBF46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"178667C6-AF1A-45FF-9189-7547B7E281D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1F12160-F10C-4951-92BF-2F48B8FF3497\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.10.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0E9BBAE-7467-4B83-B72D-A73BE2163F32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.10.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87348BB6-AD39-4EF6-AE4B-ACB905DD6B83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E9C07E5-BCAC-4765-8FB6-9DA666CE94B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C4D5C2D-1359-46D9-85C3-2AB0420EC5BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F70EA490-CE12-46CC-8205-1E2410161357\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B70B08B-5C85-41D1-B8F7-BE324C2C37F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"532C8B39-828D-4A28-A8B7-4E9290F2FA2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70664A5C-4166-4D6B-98D5-7AB98B05D4D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:1.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C393F835-75D2-4226-8B4B-4898D6585A22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA215127-90BB-4543-9197-62FBA205D8B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0AF3BFA-9873-4223-8D38-1F4CC299E1F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4136D0F-1E28-43F0-881C-704B220FFE63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nongnu:oath_toolkit:2.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A01F4276-5D47-4C5A-B49A-0061BEA842C1\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath.\"}, {\"lang\": \"es\", \"value\": \"usersfile.c en liboath en OATH Toolkit anterior a 2.4.1 no maneja debidamente l\\u00edneas que contienen un tipo one-time-password (OTP) inv\\u00e1lido y un nombre de usuario en /etc/users.oath, lo que causa la l\\u00ednea err\\u00f3nea a ser actualizada cuando es invalidado un OTP y permite a atacantes dependientes de contexto realizar ataques de repetici\\u00f3n, tal y como fue demostrado por una l\\u00ednea exterior comentada cuando libpam-oath es utilizado.\"}]",
"id": "CVE-2013-7322",
"lastModified": "2024-11-21T02:00:44.630",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:P/I:P/A:N\", \"baseScore\": 4.9, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.8, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-03-09T13:16:56.727",
"references": "[{\"url\": \"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00002.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00003.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://seclists.org/oss-sec/2014/q1/296\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.nongnu.org/oath-toolkit/NEWS.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/91316\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://seclists.org/oss-sec/2014/q1/296\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.nongnu.org/oath-toolkit/NEWS.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/91316\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-7322\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-03-09T13:16:56.727\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath.\"},{\"lang\":\"es\",\"value\":\"usersfile.c en liboath en OATH Toolkit anterior a 2.4.1 no maneja debidamente l\u00edneas que contienen un tipo one-time-password (OTP) inv\u00e1lido y un nombre de usuario en /etc/users.oath, lo que causa la l\u00ednea err\u00f3nea a ser actualizada cuando es invalidado un OTP y permite a atacantes dependientes de contexto realizar ataques de repetici\u00f3n, tal y como fue demostrado por una l\u00ednea exterior comentada cuando libpam-oath es utilizado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:N\",\"baseScore\":4.9,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.0\",\"matchCriteriaId\":\"7F80B2A2-1E9F-4F87-BF6B-48DC1D660ED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA66EA93-4923-42E5-8760-607899C824D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D1A236-F2B3-4A4D-9ED3-025FE47CEF70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8E99144-334B-40A7-972A-C82F0EB4A9BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB969EBE-41F0-44F4-947C-3BA0993FE4A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"433AA450-7581-487C-A8F7-66EF20106656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91ECF732-A101-49D7-B7DB-98CA3ED2A2EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C31F408-DAB1-41D1-B067-578D75753B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E434BCA0-0E21-4551-A233-BF51ED2CF074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6F29AAE-E8BE-4A94-9F28-C583D2917767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"552863FA-A13F-4865-8FB4-6B317EB41344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1636BEBF-6AC5-438B-9FE6-D86629E02E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5752F6FE-35C9-4985-9820-7B10578D15A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AA344FC-DD43-47DF-BB99-2CAAEFB4A720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74FB0520-5805-4AF9-B4DB-C9C17F60D356\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B56A3EB-6093-42D8-8883-893DC55AC4B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B6A266E-4610-4322-BDA1-A6C96FB7C3BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC89697E-0BF0-4F2D-95FC-CC5FBE9A1BEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12335A5-5D9F-4C97-A769-3786DF182999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5898DE-5072-49A1-BEB7-29094496955F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2657D215-C025-46B5-8B8A-2B878EFFA3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FACE0FD6-29D0-467B-A0CD-8AAE782DA23B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F55F7E1-2EA9-422E-BBAB-BFB5B96BBF46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178667C6-AF1A-45FF-9189-7547B7E281D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F12160-F10C-4951-92BF-2F48B8FF3497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E9BBAE-7467-4B83-B72D-A73BE2163F32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87348BB6-AD39-4EF6-AE4B-ACB905DD6B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E9C07E5-BCAC-4765-8FB6-9DA666CE94B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C4D5C2D-1359-46D9-85C3-2AB0420EC5BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F70EA490-CE12-46CC-8205-1E2410161357\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B70B08B-5C85-41D1-B8F7-BE324C2C37F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"532C8B39-828D-4A28-A8B7-4E9290F2FA2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70664A5C-4166-4D6B-98D5-7AB98B05D4D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:1.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C393F835-75D2-4226-8B4B-4898D6585A22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA215127-90BB-4543-9197-62FBA205D8B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0AF3BFA-9873-4223-8D38-1F4CC299E1F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4136D0F-1E28-43F0-881C-704B220FFE63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nongnu:oath_toolkit:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01F4276-5D47-4C5A-B49A-0061BEA842C1\"}]}]}],\"references\":[{\"url\":\"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00003.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/oss-sec/2014/q1/296\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.nongnu.org/oath-toolkit/NEWS.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/91316\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.nongnu.org/archive/html/oath-toolkit-help/2013-12/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/oss-sec/2014/q1/296\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.nongnu.org/oath-toolkit/NEWS.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/91316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…