libuser "luseradd"默认密码绕过安全限制漏洞
发布日期:2011-01-13
更新日期:2011-01-17
受影响系统:libuser libuser 0.56
不受影响系统:libuser libuser 0.57
描述:
BUGTRAQ ID:
45791
CVE ID:
CVE-2011-0002
libuser是实现了标准化界面的管理和操作用户和组账号的库。
libuser在实现上存在安全漏洞,远程攻击者可利用此漏洞绕过某些安全限制,获取用户的账号。
在创建用户时如果不知道密码,密码会呈现某种“默认”字符串。"userPassword:: ISE="值解码为"!!"。
<**>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
[root@hades etc]# grep -v '^#' libuser.conf
[import]
login_defs = /etc/login.defs
default_useradd = /etc/default/useradd
[defaults]
crypt_style = md5
modules = ldap
create_modules = ldap
[userdefaults]
LU_USERNAME = %n
LU_UIDNUMBER = 1001
LU_GIDNUMBER = %u
[groupdefaults]
LU_GROUPNAME = %n
LU_GIDNUMBER = 1001
[ldap]
server = ldaps://ldap.annvix.ca
basedn = dc=annvix,dc=ca
binddn = cn=root,dc=annvix,dc=ca
password = {MD5}[password-hash]
Using just "luseradd test" results in this output from slapcat:
dn: cn=test,ou=Group,dc=annvix,dc=ca
gidNumber: 1003
cn: test
objectClass: posixGroup
structuralObjectClass: posixGroup
entryUUID: 6fad4ae4-6ccc-102f-8ea2-07432e20a4f8
creatorsName: cn=root,dc=annvix,dc=ca
createTimestamp: 20101015172148Z
entryCSN: 20101015172148Z#000000#00#000000
modifiersName: cn=root,dc=annvix,dc=ca
modifyTimestamp: 20101015172148Z
dn: uid=test,ou=People,dc=annvix,dc=ca
uidNumber: 1003
uid: test
shadowMin: 0
shadowWarning: 7
shadowMax: 99999
shadowExpire: -1
loginShell: /bin/bash
shadowInactive: -1
userPassword:: ISE=
gecos: test
homeDirectory: /home/test
shadowLastChange: 14897
shadowFlag: -1
gidNumber: 1003
objectClass: posixAccount
objectClass: shadowAccount
objectClass: account
cn: test
structuralObjectClass: account
entryUUID: 6fb0f28e-6ccc-102f-8ea3-07432e20a4f8
creatorsName: cn=root,dc=annvix,dc=ca
createTimestamp: 20101015172148Z
entryCSN: 20101015172148Z#000001#00#000000
modifiersName: cn=root,dc=annvix,dc=ca
modifyTimestamp: 20101015172148Z
建议:
厂商补丁:
libuser
-------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://www.fedorahosted.org/libuser/浏览次数:3549
严重程度:0(网友投票)