Unrated severityNVD Advisory· Published Sep 17, 2009· Updated Apr 23, 2026
CVE-2009-3232
CVE-2009-3232
Description
pam-auth-update for PAM, as used in Ubuntu 8.10 and 9.4, and Debian GNU/Linux, does not properly handle an "empty selection" for system authentication modules in certain rare configurations, which causes any attempt to be successful and allows remote attackers to bypass authentication.
Affected products
2cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.securityfocus.com/bid/36306nvdBroken LinkPatchThird Party AdvisoryVDB Entry
- launchpad.net/bugs/410171nvdIssue TrackingPatch
- secunia.com/advisories/36620nvdBroken LinkVendor Advisory
- bugs.debian.org/cgi-bin/bugreport.cginvdIssue TrackingMailing List
- www.openwall.com/lists/oss-security/2009/09/08/7nvdMailing List
- usn.ubuntu.com/828-1/nvdBroken Link
News mentions
0No linked articles in our index yet.