Ubuntu 12.04 LTS / 14.04 LTS / 15.10 : pam vulnerabilities (USN-2935-1)

Ubuntu Security Notice (C) 2016 Canonical, Inc. / NASL script (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

It was discovered that the PAM pam_userdb module incorrectly used a
case-insensitive method when comparing hashed passwords. A local
attacker could possibly use this issue to make brute-force attacks
easier. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04
LTS. (CVE-2013-7041)

Sebastian Krahmer discovered that the PAM pam_timestamp module
incorrectly performed filtering. A local attacker could use this issue
to create arbitrary files, or possibly bypass authentication. This
issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2014-2583)

Sebastien Macke discovered that the PAM pam_unix module incorrectly
handled large passwords. A local attacker could possibly use this
issue in certain environments to enumerate usernames or cause a denial
of service. (CVE-2015-3238).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected libpam-modules package.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 3.9
(CVSS2#E:U/RL:OF/RC:UC)
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 89996 ()

Bugtraq ID:

CVE ID: CVE-2013-7041
CVE-2014-2583
CVE-2015-3238

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now