| Summary: | accidental full text password expose to local users possible | ||
|---|---|---|---|
| Product: | Busybox | Reporter: | surae |
| Component: | Other | Assignee: | unassigned |
| Status: | NEW --- | ||
| Severity: | normal | CC: | busybox-cvs, surae |
| Priority: | P5 | ||
| Version: | 1.26.x | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Host: | Target: | ||
| Build: | |||
|
Description
surae
2017-10-22 16:17:39 UTC
loginutils/login.c:522:
...
auth_failed:
opt &= ~LOGIN_OPT_f;
bb_do_delay(LOGIN_FAIL_DELAY);
/* TODO: doesn't sound like correct English phrase to me */
puts("Login incorrect");
if (++count == 3) {
syslog(LOG_WARNING, "invalid password for '%s'%s",
username, fromhost);
if (ENABLE_FEATURE_CLEAN_UP)
free(fromhost);
return EXIT_FAILURE;
}
username[0] = '\0';
} /* while (1) */
...
I guess, where is no sense in "if (++count == 3) { " on string 527. It saves no resource and used extrimely rare, afaik.
|