Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.840794
Kategorie:Ubuntu Local Security Checks
Titel:Ubuntu Update for pam USN-1237-1
Zusammenfassung:Ubuntu Update for Linux kernel vulnerabilities USN-1237-1
Beschreibung:Summary:
Ubuntu Update for Linux kernel vulnerabilities USN-1237-1

Vulnerability Insight:
Kees Cook discovered that the PAM pam_env module incorrectly handled
certain malformed environment files. A local attacker could use this flaw
to cause a denial of service, or possibly gain privileges. The default
compiler options for affected releases should reduce the vulnerability to a
denial of service. (CVE-2011-3148)

Kees Cook discovered that the PAM pam_env module incorrectly handled
variable expansion. A local attacker could use this flaw to cause a denial
of service. (CVE-2011-3149)

Stephane Chazelas discovered that the PAM pam_motd module incorrectly
cleaned the environment during execution of the motd scripts. In certain
environments, a local attacker could use this to execute arbitrary code
as root, and gain privileges.

Affected Software/OS:
pam on Ubuntu 11.04,
Ubuntu 10.10,
Ubuntu 10.04 LTS,
Ubuntu 8.04 LTS

Solution:
Please Install the Updated Packages.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-3148
http://security.gentoo.org/glsa/glsa-201206-31.xml
http://secunia.com/advisories/46583
http://secunia.com/advisories/49711
http://www.ubuntu.com/usn/USN-1237-1
Common Vulnerability Exposure (CVE) ID: CVE-2011-3149
Common Vulnerability Exposure (CVE) ID: CVE-2011-3628
CopyrightCopyright (c) 2011 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.