Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55738
Category:Fedora Local Security Checks
Title:Fedora Core 3 FEDORA-2005-1030 (pam)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to pam
announced via advisory FEDORA-2005-1030.

PAM (Pluggable Authentication Modules) is a system security tool that
allows system administrators to set authentication policy without
having to recompile programs that handle authentication.

Update Information:

This update fixes a security bug in unix_chkpwd allowing
brute force attacks against passwords in /etc/shadow by a
regular user when SELinux is enabled.

* Wed Oct 26 2005 Tomas Mraz 0.77-66.2.13
- fixed CVE-2005-2977 unix_chkpwd should skip user verification only if
run as root (#168181)
- support no tty in pam_access (#170467)
- support unlimited limits (#171546)
- allow larger buffer for getgr* functions
- flush input first, then print the prompt in misc_conv
- improve the passwd-order patch so it doesn't regress
passwd on the NIS master server

* Mon Jan 24 2005 Tomas Mraz
- ALLGROUP and ALL limits weren't correctly applied by pam_limits
- Fix a typo in pam_localuser README

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

This update can also be installed with the Update Agent
you can
launch the Update Agent with the 'up2date' command.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2005-1030

Risk factor : Medium

CVSS Score:
2.1

Cross-Ref: BugTraq ID: 15217
Common Vulnerability Exposure (CVE) ID: CVE-2005-2977
1015111
http://securitytracker.com/id?1015111
15217
http://www.securityfocus.com/bid/15217
17346
http://secunia.com/advisories/17346
17350
http://secunia.com/advisories/17350
17352
http://secunia.com/advisories/17352
17365
http://secunia.com/advisories/17365
ADV-2005-2227
http://www.vupen.com/english/advisories/2005/2227
GLSA-200510-22
http://www.gentoo.org/security/en/glsa/glsa-200510-22.xml
RHSA-2005:805
http://www.redhat.com/support/errata/RHSA-2005-805.html
http://cvs.sourceforge.net/viewcvs.py/pam/Linux-PAM/NEWS?rev=1.6&view=markup
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168181
oval:org.mitre.oval:def:10193
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10193
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.