David Härdeman wrote:
> I am still seeing this problem in the version of courier included in 
> sarge. Courier seems to happily ignore the result of the pam check and 
> continue anyway (when using the pam_tally module).
> 
> I would suggest that this warrants the security tag and a security 
> update as it allows a user to try to crack passwords with a brute-force 
> approach even if countermeasures (i.e. pam-tally) is in place.
> 
> This bug should probably be reassigned to courier-authdaemon 
> since I have the feeling that it is responsible for the pam 
> conversation. See also bug 256231 for related pam problems.

I'm building updated packages now and have assigned CVE-2005-3532 to
this problem.  Thanks a lot for the patch.

Regards,

        Joey

-- 
Life is a lot easier when you have someone to share it with.  -- Sean Perry

Please always Cc to me when replying to me on the lists.

Reply via email to