usersfile.c in liboath in OATH Toolkit before 2.4.1 does not properly handle lines containing an invalid one-time-password (OTP) type and a user name in /etc/users.oath, which causes the wrong line to be updated when invalidating an OTP and allows context-dependent attackers to conduct replay attacks, as demonstrated by a commented out line when using libpam-oath.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-03-09 06:16
Updated : 2017-08-28 18:34
NVD link : CVE-2013-7322
Mitre link : CVE-2013-7322
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
nongnu
- oath_toolkit