You are here
Home > Preporuke > Sigurnosni propusti programskog paketa pam

Sigurnosni propusti programskog paketa pam

==========================================================================
Ubuntu Security Notice USN-2935-1
March 16, 2016

pam vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in PAM.

Software Description:
– pam: Pluggable Authentication Modules

Details:

It was discovered that the PAM pam_userdb module incorrectly used a
case-insensitive method when comparing hashed passwords. A local attacker
could possibly use this issue to make brute force attacks easier. This
issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2013-7041)

Sebastian Krahmer discovered that the PAM pam_timestamp module incorrectly
performed filtering. A local attacker could use this issue to create
arbitrary files, or possibly bypass authentication. This issue only
affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-2583)

Sebastien Macke discovered that the PAM pam_unix module incorrectly handled
large passwords. A local attacker could possibly use this issue in certain
environments to enumerate usernames or cause a denial of service.
(CVE-2015-3238)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
libpam-modules 1.1.8-3.1ubuntu3.1

Ubuntu 14.04 LTS:
libpam-modules 1.1.8-1ubuntu2.1

Ubuntu 12.04 LTS:
libpam-modules 1.1.3-7ubuntu2.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2935-1
CVE-2013-7041, CVE-2014-2583, CVE-2015-3238

Package Information:
https://launchpad.net/ubuntu/+source/pam/1.1.8-3.1ubuntu3.1
https://launchpad.net/ubuntu/+source/pam/1.1.8-1ubuntu2.1
https://launchpad.net/ubuntu/+source/pam/1.1.3-7ubuntu2.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=SGZ9
—–END PGP SIGNATURE—–

Top
More in Preporuke
Ranjivost programskog paketa bsh2

Otkrivena je ranjivost u ugrađenom izvornom Java interpreteru, BeanShell, podržanom na operacijskom sustavu openSUSE. Potencijalni napadač ranjivost bi mogao iskoristiti...

Close