Vulnerability Description
passwd 0.68 does not check the return code for the pam_start function, which has unknown impact and attack vectors that may prevent "safe and proper operation" of PAM.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mandrakesoft | Mandrake Multi Network Firewall | 8.2 |
| Mandrakesoft | Mandrake Linux | 8.2 |
| Mandrakesoft | Mandrake Linux Corporate Server | 2.1 |
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060PatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:045PatchVendor Advisory
- http://www.securityfocus.com/bid/10370Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16179
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060PatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:045PatchVendor Advisory
- http://www.securityfocus.com/bid/10370Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16179
FAQ
What is CVE-2004-2396?
CVE-2004-2396 is a vulnerability with a CVSS score of 7.2 (HIGH). passwd 0.68 does not check the return code for the pam_start function, which has unknown impact and attack vectors that may prevent "safe and proper operation" of PAM.
How severe is CVE-2004-2396?
CVE-2004-2396 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2396?
Check the references section above for vendor advisories and patch information. Affected products include: Mandrakesoft Mandrake Multi Network Firewall, Mandrakesoft Mandrake Linux, Mandrakesoft Mandrake Linux Corporate Server.