CVE-2010-3435
Published Jan 24, 2011
Last updated 2 years ago
Overview
- Description
- The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.7
- Impact score
- 6.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D45AB07D-A1B8-4BC0-A249-A594D7895B78", "versionEndIncluding": "1.1.1" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B59C70C7-FABE-4A45-A45D-2C7276D698DF" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBA50D8F-D5A8-4123-93CF-E7714571F411" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB8820C0-1ECB-45AD-A573-5667F0D09776" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D416053-0010-4B25-9F7C-6054C51C1685" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B97AB578-0E9E-4370-8379-0CD455F2D740" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22A6147C-CC0A-4C9F-B9A9-E144F2133592" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F94AA92-5854-46B9-8B3C-08FCC5B071CF" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD5C0039-827C-45CD-99BE-95459006CA59" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4256C34-DBCA-4FE0-96A5-874D7F00869A" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B2613D2-33C1-4132-AD9A-68190A59C0F4" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08FDE78F-119B-4FC8-BBFA-8048F2CF1227" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4A75789-F7EC-4D9C-942A-243DF92E5CA5" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3753027E-D3A4-45D4-A3A3-2320C48AF6C6" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6533A629-6351-4831-BBF7-44718262FAF3" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "516F23F9-25B3-40DB-A3CA-2F1DE0678934" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F3ACA7F-D247-439C-8B5E-287EC5D236AF" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEC8C86C-9FC7-4838-BFD8-90431DEC4946" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBE3BF43-7402-4CC0-A329-C8597A0758C7" }, { "criteria": "cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A39C8AD-FA7C-4C64-AAB7-93CC461E73F2" } ], "operator": "OR" } ] } ]