Upstream information

CVE-2013-7322 at MITRE

Description

usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.9
Vector AV:N/AC:M/Au:S/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None
No SUSE Bugzilla entries cross referenced.

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Module for Basesystem 15
  • liboath0 >= 2.6.2-1.15
  • oath-toolkit-xml >= 2.6.2-1.15
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 GA liboath0
SUSE Linux Enterprise Workstation Extension 15
  • libpskc-devel >= 2.6.2-1.15
  • libpskc0 >= 2.6.2-1.15
Patchnames:
SUSE Linux Enterprise Workstation Extension 15 GA libpskc-devel
openSUSE Leap 15.0
  • libpskc0 >= 2.6.2-lp150.1.1
Patchnames:
openSUSE Leap 15.0 GA libpskc0