Vulnerabilities > CVE-2007-0844 - Unspecified vulnerability in PAM SSH PAM SSH 1.91
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN pam-ssh
nessus
Summary
The auth_via_key function in pam_ssh.c in pam_ssh before 1.92, when the allow_blank_passphrase option is disabled, allows remote attackers to bypass authentication restrictions and use private encryption keys requiring a blank passphrase by entering a non-blank passphrase.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2007-1793.NASL |
description | - Thu Aug 23 2007 Patrice Dumas <pertusus at free.fr> 1.92-2 - update to 1.92 - Fix #253959, CVE-2007-0844 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 27735 |
published | 2007-11-06 |
reporter | This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/27735 |
title | Fedora 7 : pam_ssh-1.92-2.fc7 (2007-1793) |
code |
|
References
- http://osvdb.org/33119
- http://osvdb.org/33119
- http://secunia.com/advisories/24061
- http://secunia.com/advisories/24061
- http://sourceforge.net/project/shownotes.php?release_id=484376
- http://sourceforge.net/project/shownotes.php?release_id=484376
- http://www.securityfocus.com/bid/22461
- http://www.securityfocus.com/bid/22461
- http://www.vupen.com/english/advisories/2007/0524
- http://www.vupen.com/english/advisories/2007/0524