Anfälligkeitssuche        Suche in 187964 CVE Beschreibungen
und 85075 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.105928
Kategorie:JunOS Local Security Checks
Titel:Junos RADIUS Uninteded Authentication Vulnerability
Zusammenfassung:JunOS is prone to a security bypass vulnerability
Beschreibung:Summary:
JunOS is prone to a security bypass vulnerability

Vulnerability Insight:
When a RADIUS authentication server is configured under
[system radius-server], an entry is created in /var/etc/pam_radius.conf. An issue was discovered
where RADIUS accounting servers configured under [system accounting destination radius] are also
propagated to pam_radius.conf.
If the same RADIUS server is used for both authentication and accounting - a common configuration -
the issue is less severe since RADIUS authentication is sent to the intended server despite the
duplicate entries. However, if the RADIUS authentication server is later removed from the configuration,
the duplicate entry created by configuration of the RADIUS accounting server will remain in pam_radius.conf,
also leading to possible unintended authentication success.

Vulnerability Impact:
The vulnerability can cause authentication requests
to be sent to the RADIUS authentication server which may allow for unintended successful
authentication.

Affected Software/OS:
Junos OS 11.4, 12.1, 12.2, 12.3, 13.1, 13.2 and 13.3

Solution:
New builds of Junos OS software are available from Juniper.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-6379
BugTraq ID: 70365
http://www.securityfocus.com/bid/70365
http://www.securitytracker.com/id/1031010
XForce ISS Database: juniper-junos-cve20146379-sec-bypass(96905)
https://exchange.xforce.ibmcloud.com/vulnerabilities/96905
CopyrightThis script is Copyright (C) 2014 Greenbone Networks GmbH

Dies ist nur einer von 85075 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.