Novell.CASA.PAM.Module.Buffer.Overflow
Description
This indicates a possible exploit of a stack-based buffer overflow vulnerability in the "pam_micasa" PAM authentication module in CASA on Novell Linux Desktop and Open Enterprise Server.
The vulnerability is caused by insufficient checking of user-supplied data. It may allow remote attackers to execute arbitrary code via a long username or password.
Affected Products
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Novell Linux Desktop 9.0
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
SUSE has released an advisory and fixes to address this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |