{"vuid":"VU#693909","idnumber":"693909","name":"PAM-MySQL contains a double-free vulnerability","keywords":["PAM-MySQL module","double-free","DoS","denial of service","pam_sm_authenticate()","pam_sm_chauthtok()","toppage"],"overview":"PAM-MySQL contains a double-free vulnerability that may allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.","clean_desc":"PAM-MySQL provides a Pluggable Authentication Module (PAM) interface to a MySQL database. PAM-MySQL does not securely handle a pointer returned by the pam_get_item() routine, which results in a double-free vulnerability. The vulnerability exists if the following conditions are present: Two or more PAM modules are stacked. The PAM-MySQL module is not the first in the stack. Any of the modules preceding the PAM-MySQL module are not marked as requisite.","impact":"If a remote attacker supplies a specially crafted password to a vulnerable PAM-MySQL installation, that attacker may be able to crash the PAM-MySQL process. Note that it may be possible to exploit this vulnerability to execute arbitrary code.","resolution":"Upgrade PAM-MySQL\nUpgrading to PAM-MySQL version 0.6.2  or PAM-MySQL version 0.7pre3 will correct this issue.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Moriyoshi Koizumi.","author":"This document was written by Jeff Gennari.","public":["http://jvn.jp/cert/JVNVU%23693909/index.html","http://pam-mysql.sourceforge.net/News/00005.php","http://sourceforge.net/forum/forum.php?forum_id=499394"],"cveids":["CVE-2006-0056"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-09-23T15:35:35Z","publicdate":"2005-09-28T00:00:00Z","datefirstpublished":"2006-02-09T02:05:56Z","dateupdated":"2006-05-17T11:56:55Z","revision":38,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"15","cam_easeofexploitation":"7","cam_attackeraccessrequired":"10","cam_scorecurrent":"3.9375","cam_scorecurrentwidelyknown":"4.921875","cam_scorecurrentwidelyknownexploited":"8.859375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.9375,"vulnote":null}