Debian: mod-auth-shadow Account expiration not enforced

    Date12 Jan 2004
    CategoryDebian
    2021
    Posted ByLinuxSecurity Advisories
    In this Apache module, expiration status of the user's account and password were not enforced.
    
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 421-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Matt Zimmerman
    January 12th, 2004                       http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : mod-auth-shadow
    Vulnerability  : password expiration
    Problem-Type   : remote
    Debian-specific: no
    CVE Ids        : CAN-2004-0041
    
    David B Harris discovered a problem with mod-auth-shadow, an Apache
    module which authenticates users against the system shadow password
    database, where the expiration status of the user's account and
    password were not enforced.  This vulnerability would allow an
    otherwise authorized user to successfully authenticate, when the
    attempt should be rejected due to the expiration parameters.
    
    For the current stable distribution (woody) this problem has been
    fixed in version 1.3-3.1woody.1
    
    For the unstable distribution (sid) this problem has been fixed in
    version 1.4-1.
    
    We recommend that you update your mod-auth-shadow package.
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/mod-auth-shadow_1.3-3.1woody.1.dsc
          Size/MD5 checksum:      628 0631b85270f5e589909ce3618976bffe
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/mod-auth-shadow_1.3-3.1woody.1.diff.gz
          Size/MD5 checksum:     5453 b5f344fb69005ca149bacf286844832f
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/mod-auth-shadow_1.3.orig.tar.gz
          Size/MD5 checksum:     7476 3ad4432193ac603049ad0f2fa94f2054
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_alpha.deb
          Size/MD5 checksum:    11970 d73f8c7bbc56f603aff27c9e0839c685
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_arm.deb
          Size/MD5 checksum:    11064 a016baa2812a950e0daed4930e06064a
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_i386.deb
          Size/MD5 checksum:    11116 37050a0429d599a878f52a78f64c53a1
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_ia64.deb
          Size/MD5 checksum:    13230 12e15d476e2923212066955329572fc8
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_hppa.deb
          Size/MD5 checksum:    11810 dc63de9f64595d784f76b7ba4a42f19b
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_m68k.deb
          Size/MD5 checksum:    11078 f2e0f2c0a0fac24061d9043749c1d4da
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_mips.deb
          Size/MD5 checksum:    11230 2ddbceff8f93ad432e090b634244c4f5
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_mipsel.deb
          Size/MD5 checksum:    11232 55320be2e6212242eb00310716ae346a
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_powerpc.deb
          Size/MD5 checksum:    11122 2ee5de78bdd4112d53be7416185fcc64
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_s390.deb
          Size/MD5 checksum:    11262 1d3b72a731147bb7b59255844036f024
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/m/mod-auth-shadow/libapache-mod-auth-shadow_1.3-3.1woody.1_sparc.deb
          Size/MD5 checksum:    14240 cbe2bc47536b40fa46c8eb400a8b7db1
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"40","type":"x","order":"1","pct":48.78,"resources":[]},{"id":"88","title":"Should be more technical","votes":"13","type":"x","order":"2","pct":15.85,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"29","type":"x","order":"3","pct":35.37,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.