It was found that libpam4j up to and including 1.8 did not properly validate user accounts when authenticating. A user with a valid password for a disabled account would be able to bypass security restrictions and possibly access sensitive information.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2017/11/msg00008.html | third party advisory mailing list |
https://access.redhat.com/errata/RHSA-2017:2904 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2905 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2906 | third party advisory vendor advisory |
https://www.debian.org/security/2017/dsa-4025 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1503103 | issue tracking third party advisory |