Vulnerabilities > CVE-2003-0686

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
dave-airlie
redhat
nessus
exploit available

Summary

Buffer overflow in PAM SMB module (pam_smb) 1.1.6 and earlier, when authenticating to a remote service, allows remote attackers to execute arbitrary code.

Exploit-Db

descriptionLinux pam_lib_smb < 1.1.6 /bin/login Remote Exploit. CVE-2003-0686. Remote exploit for linux platform
idEDB-ID:89
last seen2016-01-31
modified2003-08-29
published2003-08-29
reportervertex
sourcehttps://www.exploit-db.com/download/89/
titleLinux pam_lib_smb < 1.1.6 - /bin/login Remote Exploit

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_2BCD2D2424CA11D882E50020ED76EF5A.NASL
    descriptionApplications utilizing pam_smb can be compromised by any user who can enter a password. In many cases, this is a remote root compromise.
    last seen2020-06-01
    modified2020-06-02
    plugin id37495
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/37495
    titleFreeBSD : Buffer overflow in pam_smb password handling (2bcd2d24-24ca-11d8-82e5-0020ed76ef5a)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2003-262.NASL
    descriptionUpdated pam_smb packages are now available which fix a security vulnerability (buffer overflow). The pam_smb module is a pluggable authentication module (PAM) used to authenticate users using an external Server Message Block (SMB) server. A buffer overflow vulnerability has been found that affects unpatched versions of pam_smb up to and including 1.1.6. On systems that use pam_smb and are configured to authenticate a remotely accessible service, an attacker can exploit this bug and remotely execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0686 to this issue. Red Hat Enterprise Linux contains a version of pam_smb that is vulnerable to this issue, however pam_smb is not enabled by default. Users of pam_smb are advised to upgrade to these erratum packages, which contain a patch to version 1.1.6 to correct this issue. Red Hat would like to thank Dave Airlie of the Samba team for notifying us of this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id12417
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12417
    titleRHEL 2.1 : pam_smb (RHSA-2003:262)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-374.NASL
    descriptionlibpam-smb is a PAM authentication module which makes it possible to authenticate users against a password database managed by Samba or a Microsoft Windows server. If a long password is supplied, this can cause a buffer overflow which could be exploited to execute arbitrary code with the privileges of the process which invokes PAM services.
    last seen2020-06-01
    modified2020-06-02
    plugin id15211
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/15211
    titleDebian DSA-374-1 : libpam-smb - buffer overflow
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PAM_SMB_199_3.NASL
    descriptionThe following package needs to be updated: pam_smb
    last seen2016-09-26
    modified2004-07-06
    plugin id12590
    published2004-07-06
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=12590
    titleFreeBSD : Buffer overflow in pam_smb password handling (136)

Oval

accepted2007-04-25T19:52:32.853-04:00
classvulnerability
contributors
  • nameJay Beale
    organizationBastille Linux
  • nameJay Beale
    organizationBastille Linux
  • nameThomas R. Jones
    organizationMaitreya Security
descriptionBuffer overflow in PAM SMB module (pam_smb) 1.1.6 and earlier, when authenticating to a remote service, allows remote attackers to execute arbitrary code.
familyunix
idoval:org.mitre.oval:def:469
statusaccepted
submitted2003-09-05T12:00:00.000-04:00
titleBuffer Overflow in PAM SMB Module
version36

Redhat

advisories
  • rhsa
    idRHSA-2003:261
  • rhsa
    idRHSA-2003:262