Impact
If cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token.
Patches
The default to not check the private key's signature has been changed with 6638576, so that all versions starting with pam_pkcs11-0.6.0 should be affected.
Workarounds
In pam_pkcs11.conf set at least cert_policy = signature;
I suggest to set this flag to 1
in the source code by default.
References
Are there any links users can visit to find out more?
Impact
If cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of logging into the token. An attacker may create a different token with the user's public data (e.g. the user's certificate) and a PIN known to the attacker. If no signature with the private key is required, then the attacker may now login as user with that created token.
Patches
The default to not check the private key's signature has been changed with 6638576, so that all versions starting with pam_pkcs11-0.6.0 should be affected.
Workarounds
In pam_pkcs11.conf set at least
cert_policy = signature;
I suggest to set this flag to
1
in the source code by default.References
Are there any links users can visit to find out more?