CVE-2010-3316

Severity

32%

Complexity

34%

Confidentiality

81%

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

CVSS 2.0 Base Score 3.3. CVSS Attack Vector: local. CVSS Attack Complexity: medium. CVSS Vector: (AV:L/AC:M/Au:N/C:P/I:P/A:N).

Overview

Type

Linux-PAM

First reported 14 years ago

2011-01-24 18:00:00

Last updated 6 years ago

2019-01-03 15:01:00

Affected Software

Linux-PAM 0.99.1.0

0.99.1.0

Linux-PAM 0.99.2.0

0.99.2.0

Linux-PAM 0.99.2.1

0.99.2.1

Linux-PAM 0.99.3.0

0.99.3.0

Linux-PAM 0.99.4.0

0.99.4.0

Linux-PAM 0.99.5.0

0.99.5.0

Linux-PAM 0.99.6.0

0.99.6.0

Linux-PAM 0.99.6.1

0.99.6.1

Linux-PAM 0.99.6.2

0.99.6.2

Linux-PAM 0.99.6.3

0.99.6.3

Linux-PAM 0.99.7.0

0.99.7.0

Linux-PAM 0.99.7.1

0.99.7.1

Linux-PAM 0.99.8.0

0.99.8.0

Linux-PAM 0.99.8.1

0.99.8.1

Linux-PAM 0.99.9.0

0.99.9.0

Linux-PAM 0.99.10.0

0.99.10.0

Linux-PAM 1.0.0

1.0.0

Linux-PAM 1.0.1

1.0.1

Linux-PAM 1.0.2

1.0.2

Linux-PAM 1.0.3

1.0.3

Linux-PAM 1.0.4

1.0.4

Linux-PAM 1.1.0

1.1.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.