Ubuntu Security Notice (C) 2016 Canonical, Inc. / NASL script (C) 2016 Tenable Network Security, Inc.
The remote Ubuntu host is missing a security-related patch.
USN-2935-1 fixed vulnerabilities in PAM. The updates contained a
packaging change that prevented upgrades in certain multiarch
environments. This update fixes the problem.
We apologize for the inconvenience.
It was discovered that the PAM pam_userdb module incorrectly used a
case-insensitive method when comparing hashed passwords. A local
attacker could possibly use this issue to make brute-force attacks
easier. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04
Sebastian Krahmer discovered that the PAM pam_timestamp
module incorrectly performed filtering. A local attacker
could use this issue to create arbitrary files, or possibly
bypass authentication. This issue only affected Ubuntu 12.04
LTS and Ubuntu 14.04 LTS. (CVE-2014-2583)
Sebastien Macke discovered that the PAM pam_unix module
incorrectly handled large passwords. A local attacker could
possibly use this issue in certain environments to enumerate
usernames or cause a denial of service. (CVE-2015-3238).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
Update the affected libpam-modules package.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 3.9
Public Exploit Available : false