4.3
CVSSv2

CVE-2013-7041

Published: 08/05/2014 Updated: 03/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The pam_userdb module for Pam uses a case-insensitive method to compare hashed passwords, which makes it easier for malicious users to guess the password via a brute force attack.

Vulnerable Product Search on Vulmon Subscribe to Product

cristian gafton pam userdb -

Vendor Advisories

Debian Bug report logs - #757555 pam: CVE-2014-2583 pam_timestamp directory traversal issues Package: src:pam; Maintainer for src:pam is Steve Langasek <vorlon@debianorg>; Reported by: Michael Gilbert <mgilbert@debianorg> Date: Sat, 9 Aug 2014 10:21:02 UTC Severity: important Tags: patch, security Found in versio ...
Debian Bug report logs - #731368 pam_userdb: CVE-2013-7041: Password hashes must be compared case-sensitively Package: libpam-modules; Maintainer for libpam-modules is Steve Langasek <vorlon@debianorg>; Source for libpam-modules is src:pam (PTS, buildd, popcon) Reported by: Kim Vandry <vandry@TZoNEORG> Date: Wed, ...
USN-2935-1 introduced a regression in PAM ...
Several security issues were fixed in PAM ...
USN-2935-1 introduced a regression in PAM ...
Multiple directory traversal vulnerabilities in pam_timestampc in the pam_timestamp module for Linux-PAM (aka pam) 118 allow local users to create aribitrary files or possibly bypass authentication via a (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty funtion, which is used by the format_ti ...
The pam_userdb module for Pam uses a case-insensitive method to compare hashed passwords, which makes it easier for attackers to guess the password via a brute force attack ...