Linux Security
    Linux Security
    Linux Security

    Debian: mod-auth-shadow Account expiration not enforced

    Date 12 Jan 2004
    Posted By LinuxSecurity Advisories
    In this Apache module, expiration status of the user's account and password were not enforced.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 421-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    January 12th, 2004             
    - --------------------------------------------------------------------------
    Package        : mod-auth-shadow
    Vulnerability  : password expiration
    Problem-Type   : remote
    Debian-specific: no
    CVE Ids        : CAN-2004-0041
    David B Harris discovered a problem with mod-auth-shadow, an Apache
    module which authenticates users against the system shadow password
    database, where the expiration status of the user's account and
    password were not enforced.  This vulnerability would allow an
    otherwise authorized user to successfully authenticate, when the
    attempt should be rejected due to the expiration parameters.
    For the current stable distribution (woody) this problem has been
    fixed in version 1.3-3.1woody.1
    For the unstable distribution (sid) this problem has been fixed in
    version 1.4-1.
    We recommend that you update your mod-auth-shadow package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      628 0631b85270f5e589909ce3618976bffe
          Size/MD5 checksum:     5453 b5f344fb69005ca149bacf286844832f
          Size/MD5 checksum:     7476 3ad4432193ac603049ad0f2fa94f2054
      Alpha architecture:
          Size/MD5 checksum:    11970 d73f8c7bbc56f603aff27c9e0839c685
      ARM architecture:
          Size/MD5 checksum:    11064 a016baa2812a950e0daed4930e06064a
      Intel IA-32 architecture:
          Size/MD5 checksum:    11116 37050a0429d599a878f52a78f64c53a1
      Intel IA-64 architecture:
          Size/MD5 checksum:    13230 12e15d476e2923212066955329572fc8
      HP Precision architecture:
          Size/MD5 checksum:    11810 dc63de9f64595d784f76b7ba4a42f19b
      Motorola 680x0 architecture:
          Size/MD5 checksum:    11078 f2e0f2c0a0fac24061d9043749c1d4da
      Big endian MIPS architecture:
          Size/MD5 checksum:    11230 2ddbceff8f93ad432e090b634244c4f5
      Little endian MIPS architecture:
          Size/MD5 checksum:    11232 55320be2e6212242eb00310716ae346a
      PowerPC architecture:
          Size/MD5 checksum:    11122 2ee5de78bdd4112d53be7416185fcc64
      IBM S/390 architecture:
          Size/MD5 checksum:    11262 1d3b72a731147bb7b59255844036f024
      Sun Sparc architecture:
          Size/MD5 checksum:    14240 cbe2bc47536b40fa46c8eb400a8b7db1
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.