CVE-2010-3853

Severity

69%

Complexity

34%

Confidentiality

165%

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

CVSS 2.0 Base Score 6.9. CVSS Attack Vector: local. CVSS Attack Complexity: medium. CVSS Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C).

Overview

Type

Linux-PAM

First reported 14 years ago

2011-01-24 18:00:00

Last updated 6 years ago

2019-01-03 15:01:00

Affected Software

Linux-PAM 0.99.1.0

0.99.1.0

Linux-PAM 0.99.2.0

0.99.2.0

Linux-PAM 0.99.2.1

0.99.2.1

Linux-PAM 0.99.3.0

0.99.3.0

Linux-PAM 0.99.4.0

0.99.4.0

Linux-PAM 0.99.5.0

0.99.5.0

Linux-PAM 0.99.6.0

0.99.6.0

Linux-PAM 0.99.6.1

0.99.6.1

Linux-PAM 0.99.6.2

0.99.6.2

Linux-PAM 0.99.6.3

0.99.6.3

Linux-PAM 0.99.7.0

0.99.7.0

Linux-PAM 0.99.7.1

0.99.7.1

Linux-PAM 0.99.8.0

0.99.8.0

Linux-PAM 0.99.8.1

0.99.8.1

Linux-PAM 0.99.9.0

0.99.9.0

Linux-PAM 0.99.10.0

0.99.10.0

Linux-PAM 1.0.0

1.0.0

Linux-PAM 1.0.1

1.0.1

Linux-PAM 1.0.2

1.0.2

Linux-PAM 1.0.3

1.0.3

Linux-PAM 1.0.4

1.0.4

Linux-PAM 1.1.0

1.1.0

Linux-PAM 1.1.1

1.1.1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.