GSD-2010-0833
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
The pam_lsass library in Likewise Open 5.4 and CIFS 5.4 before build 8046, and 6.0 before build 8234, as used in HP StorageWorks X9000 Network Storage Systems and possibly other products, uses "SetPassword logic" when running as part of a root service, which allows remote attackers to bypass authentication for a Likewise Security Authority (lsassd) account whose password is marked as expired.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2010-0833",
"description": "The pam_lsass library in Likewise Open 5.4 and CIFS 5.4 before build 8046, and 6.0 before build 8234, as used in HP StorageWorks X9000 Network Storage Systems and possibly other products, uses \"SetPassword logic\" when running as part of a root service, which allows remote attackers to bypass authentication for a Likewise Security Authority (lsassd) account whose password is marked as expired.",
"id": "GSD-2010-0833"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2010-0833"
],
"details": "The pam_lsass library in Likewise Open 5.4 and CIFS 5.4 before build 8046, and 6.0 before build 8234, as used in HP StorageWorks X9000 Network Storage Systems and possibly other products, uses \"SetPassword logic\" when running as part of a root service, which allows remote attackers to bypass authentication for a Likewise Security Authority (lsassd) account whose password is marked as expired.",
"id": "GSD-2010-0833",
"modified": "2023-12-13T01:21:28.754822Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2010-0833",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The pam_lsass library in Likewise Open 5.4 and CIFS 5.4 before build 8046, and 6.0 before build 8234, as used in HP StorageWorks X9000 Network Storage Systems and possibly other products, uses \"SetPassword logic\" when running as part of a root service, which allows remote attackers to bypass authentication for a Likewise Security Authority (lsassd) account whose password is marked as expired."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-964-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-964-1"
},
{
"name": "20100726 [LWSA-2010-001] Likewise Open 5.4 \u0026 6.0",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/512643/100/0/threaded"
},
{
"name": "40725",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40725"
},
{
"name": "SSRT1000385",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=129719002806096\u0026w=2"
},
{
"name": "40736",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/40736"
},
{
"name": "43244",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43244"
},
{
"name": "1025031",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025031"
},
{
"name": "http://www.likewise.com/community/index.php/forums/viewthread/772/",
"refsource": "CONFIRM",
"url": "http://www.likewise.com/community/index.php/forums/viewthread/772/"
},
{
"name": "ADV-2010-1913",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/1913"
},
{
"name": "HPSBST02630",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=129719002806096\u0026w=2"
},
{
"name": "ADV-2011-0312",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0312"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:likewise:likewise_open:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:likewise:likewise_open:5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:likewise:likewise_cifs:5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2010-0833"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The pam_lsass library in Likewise Open 5.4 and CIFS 5.4 before build 8046, and 6.0 before build 8234, as used in HP StorageWorks X9000 Network Storage Systems and possibly other products, uses \"SetPassword logic\" when running as part of a root service, which allows remote attackers to bypass authentication for a Likewise Security Authority (lsassd) account whose password is marked as expired."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2010-1913",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/1913"
},
{
"name": "40736",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/40736"
},
{
"name": "http://www.likewise.com/community/index.php/forums/viewthread/772/",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.likewise.com/community/index.php/forums/viewthread/772/"
},
{
"name": "40725",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/40725"
},
{
"name": "USN-964-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-964-1"
},
{
"name": "43244",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43244"
},
{
"name": "1025031",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1025031"
},
{
"name": "ADV-2011-0312",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0312"
},
{
"name": "SSRT1000385",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=129719002806096\u0026w=2"
},
{
"name": "20100726 [LWSA-2010-001] Likewise Open 5.4 \u0026 6.0",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/512643/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-10T19:53Z",
"publishedDate": "2010-07-28T12:48Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…