Búsqueda de    
Vulnerabilidad   
    Buscar 191973 Descripciones CVE y
86218 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.105928
Categoría:JunOS Local Security Checks
Título:Junos RADIUS Uninteded Authentication Vulnerability
Resumen:JunOS is prone to a security bypass vulnerability
Descripción:Summary:
JunOS is prone to a security bypass vulnerability

Vulnerability Insight:
When a RADIUS authentication server is configured under
[system radius-server], an entry is created in /var/etc/pam_radius.conf. An issue was discovered
where RADIUS accounting servers configured under [system accounting destination radius] are also
propagated to pam_radius.conf.
If the same RADIUS server is used for both authentication and accounting - a common configuration -
the issue is less severe since RADIUS authentication is sent to the intended server despite the
duplicate entries. However, if the RADIUS authentication server is later removed from the configuration,
the duplicate entry created by configuration of the RADIUS accounting server will remain in pam_radius.conf,
also leading to possible unintended authentication success.

Vulnerability Impact:
The vulnerability can cause authentication requests
to be sent to the RADIUS authentication server which may allow for unintended successful
authentication.

Affected Software/OS:
Junos OS 11.4, 12.1, 12.2, 12.3, 13.1, 13.2 and 13.3

Solution:
New builds of Junos OS software are available from Juniper.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2014-6379
BugTraq ID: 70365
http://www.securityfocus.com/bid/70365
http://www.securitytracker.com/id/1031010
XForce ISS Database: juniper-junos-cve20146379-sec-bypass(96905)
https://exchange.xforce.ibmcloud.com/vulnerabilities/96905
CopyrightThis script is Copyright (C) 2014 Greenbone Networks GmbH

Esta es sólo una de 86218 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2020 E-Soft Inc. Todos los derechos reservados.