CVE-2010-3431

Summary

The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.

Technical Details

CVSSv2 Score:

1.9

CWE ID:

NVD-CWE-Other

Published Date:

Monday 24th of January 2011

Modified Date:

Thursday 3rd of January 2019

CVSSv2 Score:
  • Access Vector: Local
  • Access Complexity: Medium
  • Authentication Required: None
  • Confidentiality Impact: Partial
  • Integrity Impact: None
  • Availability Impact: None
Common Platform Enumeration (CPE) Affected: Common Platform Enumeration (CPE) List:

Reference: Find your Vulnerabilities:

Find out if you have vulnerabilities exposing you to hackers and malware: Download Mageni's Free Edition

Keyword Search

Search CVEs, Products and Vendors.

Don't pay for a vulnerability scanning and management platform. This one is free.

Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.