Ubuntu Update for PAM vulnerabilitie
Reporter | Title | Published | Views | Family All 135 |
---|---|---|---|---|
OpenVAS | Ubuntu: Security Advisory (USN-1140-2) | 6 Jun 201100:00 | – | openvas |
OpenVAS | Ubuntu Update for pam USN-1140-1 | 6 Jun 201100:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-1140-1) | 6 Jun 201100:00 | – | openvas |
OpenVAS | Oracle: Security Advisory (ELSA-2010-0819) | 6 Oct 201500:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 201206-31 (pam) | 10 Aug 201200:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 201206-31 (pam) | 10 Aug 201200:00 | – | openvas |
OpenVAS | Oracle: Security Advisory (ELSA-2010-0891) | 6 Oct 201500:00 | – | openvas |
OpenVAS | Fedora Update for pam FEDORA-2010-17133 | 23 Nov 201000:00 | – | openvas |
OpenVAS | RedHat Update for pam RHSA-2010:0819-01 | 16 Nov 201000:00 | – | openvas |
OpenVAS | Mandriva Update for pam MDVSA-2010:220 (pam) | 16 Nov 201000:00 | – | openvas |
Source | Link |
---|---|
ubuntu | www.ubuntu.com/usn/usn-1140-2/ |
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_ubuntu_USN_1140_2.nasl 7964 2017-12-01 07:32:11Z santu $
#
# Ubuntu Update for pam USN-1140-2
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
tag_insight = "USN-1140-1 fixed vulnerabilities in PAM. A regression was found that caused
cron to stop working with a "Module is unknown" error. As a result, systems
configured with automatic updates will not receive updates until cron is
restarted, these updates are installed or the system is rebooted. This
update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Marcus Granado discovered that PAM incorrectly handled configuration files
with non-ASCII usernames. A remote attacker could use this flaw to cause a
denial of service, or possibly obtain login access with a different users
username. This issue only affected Ubuntu 8.04 LTS. (CVE-2009-0887)
It was discovered that the PAM pam_xauth, pam_env and pam_mail modules
incorrectly handled dropping privileges when performing operations. A local
attacker could use this flaw to read certain arbitrary files, and access
other sensitive information. (CVE-2010-3316, CVE-2010-3430, CVE-2010-3431,
CVE-2010-3435)
It was discovered that the PAM pam_namespace module incorrectly cleaned the
environment during execution of the namespace.init script. A local attacker
could use this flaw to possibly gain privileges. (CVE-2010-3853)
It was discovered that the PAM pam_xauth module incorrectly handled certain
failures. A local attacker could use this flaw to delete certain unintended
files. (CVE-2010-4706)
It was discovered that the PAM pam_xauth module incorrectly verified
certain file properties. A local attacker could use this flaw to cause a
denial of service. (CVE-2010-4707)";
tag_summary = "Ubuntu Update for Linux kernel vulnerabilities USN-1140-2";
tag_affected = "pam on Ubuntu 11.04 ,
Ubuntu 10.10 ,
Ubuntu 10.04 LTS ,
Ubuntu 8.04 LTS";
tag_solution = "Please Install the Updated Packages.";
if(description)
{
script_xref(name: "URL" , value: "http://www.ubuntu.com/usn/usn-1140-2/");
script_id(840673);
script_version("$Revision: 7964 $");
script_tag(name:"last_modification", value:"$Date: 2017-12-01 08:32:11 +0100 (Fri, 01 Dec 2017) $");
script_tag(name:"creation_date", value:"2011-06-06 16:56:27 +0200 (Mon, 06 Jun 2011)");
script_tag(name:"cvss_base", value:"6.9");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_xref(name: "USN", value: "1140-2");
script_cve_id("CVE-2009-0887", "CVE-2010-3316", "CVE-2010-3430", "CVE-2010-3431", "CVE-2010-3435", "CVE-2010-3853", "CVE-2010-4706", "CVE-2010-4707");
script_name("Ubuntu Update for pam USN-1140-2");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2011 Greenbone Networks GmbH");
script_family("Ubuntu Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/ubuntu_linux", "ssh/login/packages");
script_tag(name : "summary" , value : tag_summary);
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-deb.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "UBUNTU10.10")
{
if ((res = isdpkgvuln(pkg:"libpam-modules", ver:"1.1.1-4ubuntu2.3", rls:"UBUNTU10.10")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isdpkgvuln(pkg:"libpam0g", ver:"1.1.1-4ubuntu2.3", rls:"UBUNTU10.10")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
if(release == "UBUNTU10.04 LTS")
{
if ((res = isdpkgvuln(pkg:"libpam-modules", ver:"1.1.1-2ubuntu5.3", rls:"UBUNTU10.04 LTS")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isdpkgvuln(pkg:"libpam0g", ver:"1.1.1-2ubuntu5.3", rls:"UBUNTU10.04 LTS")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
if(release == "UBUNTU11.04")
{
if ((res = isdpkgvuln(pkg:"libpam-modules", ver:"1.1.2-2ubuntu8.3", rls:"UBUNTU11.04")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isdpkgvuln(pkg:"libpam0g", ver:"1.1.2-2ubuntu8.3", rls:"UBUNTU11.04")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
if(release == "UBUNTU8.04 LTS")
{
if ((res = isdpkgvuln(pkg:"libpam-modules", ver:"0.99.7.1-5ubuntu6.4", rls:"UBUNTU8.04 LTS")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isdpkgvuln(pkg:"libpam0g", ver:"0.99.7.1-5ubuntu6.4", rls:"UBUNTU8.04 LTS")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo