CVE-2007-3945
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/07/2007
Last modified:
21/11/2024
Description
Rule Set Based Access Control (RSBAC) before 1.3.5 does not properly use the Linux Kernel Crypto API for the Linux kernel 2.6.x, which allows context-dependent attackers to bypass authentication controls via unspecified vectors, possibly involving User Management password hashing and unchecked function return codes.
Impact
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:rsbac:rule_set_based_access_control:*:*:*:*:*:*:*:* | 1.3.5 (excluding) | |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.0 (including) | 2.6.39.4 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://download.rsbac.org/code/1.3.5/changes-1.3.5.txt
- http://secunia.com/advisories/26147
- http://securityreason.com/securityalert/2911
- http://www.securityfocus.com/archive/1/474161/100/0/threaded
- http://www.securityfocus.com/bid/25001
- http://www.vupen.com/english/advisories/2007/2610
- http://download.rsbac.org/code/1.3.5/changes-1.3.5.txt
- http://secunia.com/advisories/26147
- http://securityreason.com/securityalert/2911
- http://www.securityfocus.com/archive/1/474161/100/0/threaded
- http://www.securityfocus.com/bid/25001
- http://www.vupen.com/english/advisories/2007/2610