The m_authenticate function in modules/m_sasl.c in Charybdis before 3.5.3 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Debian_linux | Debian | 8.0 (including) | 8.0 (including) |
Charybdis | Ubuntu | artful | * |
Charybdis | Ubuntu | esm-apps/xenial | * |
Charybdis | Ubuntu | precise | * |
Charybdis | Ubuntu | trusty | * |
Charybdis | Ubuntu | trusty/esm | * |
Charybdis | Ubuntu | upstream | * |
Charybdis | Ubuntu | xenial | * |
Charybdis | Ubuntu | yakkety | * |
Charybdis | Ubuntu | zesty | * |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.