Anfälligkeitssuche        Suche in 211766 CVE Beschreibungen
und 97459 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.4.2014.0631.1
Kategorie:SuSE Local Security Checks
Titel:SUSE: Security Advisory (SUSE-SU-2014:0631-1)
Zusammenfassung:The remote host is missing an update for the 'pam' package(s) announced via the SUSE-SU-2014:0631-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'pam' package(s) announced via the SUSE-SU-2014:0631-1 advisory.

Vulnerability Insight:
This update changes the broken default behavior of pam_pwhistory to not enforce checks when the root user requests password changes. In order to enforce pwhistory checks on the root user, the 'enforce_for_root' parameter needs to be set for the pam_pwhistory.so module.

This pam update fixes the following security and non-security issues:

* bnc#870433: Fixed pam_timestamp path injection problem (CVE-2014-2583)
* bnc#848417: Fixed pam_pwhistory root password enforcement when resetting non-root user's password

Security Issue references:

* CVE-2014-2583
>

Affected Software/OS:
'pam' package(s) on SUSE Linux Enterprise Software Development Kit 11 SP3, SUSE Linux Enterprise Server 11 SP3, SUSE Linux Enterprise Desktop 11 SP3

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-2583
BugTraq ID: 66493
http://www.securityfocus.com/bid/66493
https://security.gentoo.org/glsa/201605-05
http://www.openwall.com/lists/oss-security/2014/03/24/5
http://www.openwall.com/lists/oss-security/2014/03/26/10
http://www.openwall.com/lists/oss-security/2014/03/31/6
http://secunia.com/advisories/57317
http://www.ubuntu.com/usn/USN-2935-1
http://www.ubuntu.com/usn/USN-2935-2
http://www.ubuntu.com/usn/USN-2935-3
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Dies ist nur einer von 97459 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2021 E-Soft Inc. Alle Rechte vorbehalten.