Scientific Linux Security Update : pam on SL6.x i386/x86_64 (20130221)

medium Nessus Plugin ID 64955

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A stack-based buffer overflow flaw was found in the way the pam_env module parsed users' '~/.pam_environment' files. If an application's PAM configuration contained 'user_readenv=1' (this is not the default), a local attacker could use this flaw to crash the application or, possibly, escalate their privileges. (CVE-2011-3148)

A denial of service flaw was found in the way the pam_env module expanded certain environment variables. If an application's PAM configuration contained 'user_readenv=1' (this is not the default), a local attacker could use this flaw to cause the application to enter an infinite loop. (CVE-2011-3149)

Solution

Update the affected pam, pam-debuginfo and / or pam-devel packages.

See Also

http://www.nessus.org/u?16ca78d7

Plugin Details

Severity: Medium

ID: 64955

File Name: sl_20130221_pam_on_SL6_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 3/1/2013

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:pam, p-cpe:/a:fermilab:scientific_linux:pam-debuginfo, p-cpe:/a:fermilab:scientific_linux:pam-devel, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2/21/2013

Vulnerability Publication Date: 7/22/2012

Reference Information

CVE: CVE-2011-3148, CVE-2011-3149