[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] Re: Yubiserver package ships with pre-filled identities
From:       "Steven M. Christey" <coley () rcf-smtp ! mitre ! org>
Date:       2012-01-31 15:23:10
Message-ID: Pine.GSO.4.64.1201311018490.24478 () faron ! mitre ! org
[Download RAW message or body]


On Tue, 31 Jan 2012, Gian Piero Carrubba wrote:

> More generally, in a 2FA environment, a default account in yubiserver 
> could lessen the security level but should not expose a straight attack 
> vector.

If a security feature is less strong than advertised (or less strong than 
its user may reasonably assume), then this is enough to qualify for CVE.

> Problem arises when a user doesn't check the account db [0] and blindly 
> trust the results of key validation, possibly automatically mapping 
> successfully validated keys to default users. I doubt this can happen 
> for system logins, unless something is seriously wrong, but there are 
> other resources for whose I think this scenario is plausible (i.e. 
> authentication to a proxy server or granting access to a network 
> segment).

Since there are plausible scenarios in which the feature could be misused, 
this also seems to qualify for a CVE.

> To be honest, issuing a CVE seems a bit overkilling to me.

CVE doesn't cover just the most serious vulnerabilities out there. While 
the circumstances might be rare, and it's not as serious as other 
problems, it's still "bad enough" that some consumers would care about it.

- Steve
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic