CVE-2007-3945

Rule Set Based Access Control (RSBAC) before 1.3.5 does not properly use the Linux Kernel Crypto API for the Linux kernel 2.6.x, which allows context-dependent attackers to bypass authentication controls via unspecified vectors, possibly involving User Management password hashing and unchecked function return codes.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rsbac:rule_set_based_access_control:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

20 Jun 2023, 18:09

Type Values Removed Values Added
CPE cpe:2.3:a:rsbac:rule_set_based_access_control:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rsbac:rule_set_based_access_control:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rsbac:rule_set_based_access_control:*:*:*:*:*:*:*:*
References (SREASON) http://securityreason.com/securityalert/2911 - (SREASON) http://securityreason.com/securityalert/2911 - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2007/2610 - (VUPEN) http://www.vupen.com/english/advisories/2007/2610 - URL Repurposed
References (CONFIRM) http://download.rsbac.org/code/1.3.5/changes-1.3.5.txt - (CONFIRM) http://download.rsbac.org/code/1.3.5/changes-1.3.5.txt - Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/26147 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/26147 - Broken Link
References (BID) http://www.securityfocus.com/bid/25001 - (BID) http://www.securityfocus.com/bid/25001 - Broken Link, Third Party Advisory, VDB Entry
References (BUGTRAQ) http://www.securityfocus.com/archive/1/474161/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/474161/100/0/threaded - Third Party Advisory, VDB Entry

Information

Published : 2007-07-23 23:30

Updated : 2023-12-10 10:40


NVD link : CVE-2007-3945

Mitre link : CVE-2007-3945

CVE.ORG link : CVE-2007-3945


JSON object : View

Products Affected

linux

  • linux_kernel

rsbac

  • rule_set_based_access_control