Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в модулях аутентификации PAM
Опубликовано:8 ноября 2010 г.
Источник:
SecurityVulns ID:11240
Тип:локальная
Уровень опасности:
5/10
Описание:Различные уязвимости в модулях pam_xauth, pam_mail, pam_namespace.
Затронутые продукты:PAM : pam 1.1
CVE:CVE-2010-3853 (pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.)
 CVE-2010-3435 (The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.)
 CVE-2010-3316 (The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2010:220 ] pam (08.11.2010)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород