CVE-2010-3435

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.
References
Link Resource
http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6
http://lists.vmware.com/pipermail/security-announce/2011/000126.html
http://openwall.com/lists/oss-security/2010/09/21/3 Patch
http://openwall.com/lists/oss-security/2010/09/27/10
http://openwall.com/lists/oss-security/2010/09/27/4 Patch
http://openwall.com/lists/oss-security/2010/09/27/5 Patch
http://openwall.com/lists/oss-security/2010/09/27/7 Patch
http://openwall.com/lists/oss-security/2010/09/27/8
http://openwall.com/lists/oss-security/2010/10/25/2 Patch
http://secunia.com/advisories/49711
http://security.gentoo.org/glsa/glsa-201206-31.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:220
http://www.openwall.com/lists/oss-security/2010/09/24/2
http://www.redhat.com/support/errata/RHSA-2010-0819.html
http://www.redhat.com/support/errata/RHSA-2010-0891.html
http://www.securityfocus.com/archive/1/516909/100/0/threaded
http://www.vmware.com/security/advisories/VMSA-2011-0004.html
http://www.vupen.com/english/advisories/2011/0606
https://bugzilla.redhat.com/show_bug.cgi?id=641335 Patch
http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6
http://lists.vmware.com/pipermail/security-announce/2011/000126.html
http://openwall.com/lists/oss-security/2010/09/21/3 Patch
http://openwall.com/lists/oss-security/2010/09/27/10
http://openwall.com/lists/oss-security/2010/09/27/4 Patch
http://openwall.com/lists/oss-security/2010/09/27/5 Patch
http://openwall.com/lists/oss-security/2010/09/27/7 Patch
http://openwall.com/lists/oss-security/2010/09/27/8
http://openwall.com/lists/oss-security/2010/10/25/2 Patch
http://secunia.com/advisories/49711
http://security.gentoo.org/glsa/glsa-201206-31.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:220
http://www.openwall.com/lists/oss-security/2010/09/24/2
http://www.redhat.com/support/errata/RHSA-2010-0819.html
http://www.redhat.com/support/errata/RHSA-2010-0891.html
http://www.securityfocus.com/archive/1/516909/100/0/threaded
http://www.vmware.com/security/advisories/VMSA-2011-0004.html
http://www.vupen.com/english/advisories/2011/0606
https://bugzilla.redhat.com/show_bug.cgi?id=641335 Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:18

Type Values Removed Values Added
References () http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6 - () http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6 -
References () http://lists.vmware.com/pipermail/security-announce/2011/000126.html - () http://lists.vmware.com/pipermail/security-announce/2011/000126.html -
References () http://openwall.com/lists/oss-security/2010/09/21/3 - Patch () http://openwall.com/lists/oss-security/2010/09/21/3 - Patch
References () http://openwall.com/lists/oss-security/2010/09/27/10 - () http://openwall.com/lists/oss-security/2010/09/27/10 -
References () http://openwall.com/lists/oss-security/2010/09/27/4 - Patch () http://openwall.com/lists/oss-security/2010/09/27/4 - Patch
References () http://openwall.com/lists/oss-security/2010/09/27/5 - Patch () http://openwall.com/lists/oss-security/2010/09/27/5 - Patch
References () http://openwall.com/lists/oss-security/2010/09/27/7 - Patch () http://openwall.com/lists/oss-security/2010/09/27/7 - Patch
References () http://openwall.com/lists/oss-security/2010/09/27/8 - () http://openwall.com/lists/oss-security/2010/09/27/8 -
References () http://openwall.com/lists/oss-security/2010/10/25/2 - Patch () http://openwall.com/lists/oss-security/2010/10/25/2 - Patch
References () http://secunia.com/advisories/49711 - () http://secunia.com/advisories/49711 -
References () http://security.gentoo.org/glsa/glsa-201206-31.xml - () http://security.gentoo.org/glsa/glsa-201206-31.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:220 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:220 -
References () http://www.openwall.com/lists/oss-security/2010/09/24/2 - () http://www.openwall.com/lists/oss-security/2010/09/24/2 -
References () http://www.redhat.com/support/errata/RHSA-2010-0819.html - () http://www.redhat.com/support/errata/RHSA-2010-0819.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0891.html - () http://www.redhat.com/support/errata/RHSA-2010-0891.html -
References () http://www.securityfocus.com/archive/1/516909/100/0/threaded - () http://www.securityfocus.com/archive/1/516909/100/0/threaded -
References () http://www.vmware.com/security/advisories/VMSA-2011-0004.html - () http://www.vmware.com/security/advisories/VMSA-2011-0004.html -
References () http://www.vupen.com/english/advisories/2011/0606 - () http://www.vupen.com/english/advisories/2011/0606 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=641335 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=641335 - Patch

Information

Published : 2011-01-24 18:00

Updated : 2024-11-21 01:18


NVD link : CVE-2010-3435

Mitre link : CVE-2010-3435

CVE.ORG link : CVE-2010-3435


JSON object : View

Products Affected

linux-pam

  • linux-pam