Vulnerabilities > CVE-2000-0843 - Buffer Overflow vulnerability in NT Authentication PAM Modules

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
dave-airlie
luke-kenneth-casson-leighton
critical
nessus

Summary

Buffer overflow in pam_smb and pam_ntdom pluggable authentication modules (PAM) allow remote attackers to execute arbitrary commands via a login with a long user name.

Vulnerable Configurations

Part Description Count
Application
Dave_Airlie
1
Application
Luke_Kenneth_Casson_Leighton
1

Nessus

NASL familyGain a shell remotely
NASL idPAM_SMB.NASL
descriptionThe remote telnet server shuts the connection abruptly when given a long username followed by a password. Although Nessus could not be 100% positive, it may mean that the remote host is using an older pam_smb or pam_ntdom pluggable authentication module to validate user credentials against a NT domain. Older versions of these modules have a well known buffer overflow that could allow an intruder to execute arbitrary commands as root on this host. It may also mean that this telnet server is weak and crashes when issued a too long username, in this case this host is vulnerable to a similar flow. This may also be a false positive.
last seen2020-06-01
modified2020-06-02
plugin id10517
published2000-09-16
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10517
titlepam_smb / pam_ntdom User Name Remote Overflow