CVE-2010-3430

The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
References
Link Resource
http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a
http://openwall.com/lists/oss-security/2010/09/21/10
http://openwall.com/lists/oss-security/2010/09/21/3 Patch
http://openwall.com/lists/oss-security/2010/09/21/8 Patch
http://openwall.com/lists/oss-security/2010/09/21/9
http://openwall.com/lists/oss-security/2010/09/27/10
http://openwall.com/lists/oss-security/2010/09/27/4 Patch
http://openwall.com/lists/oss-security/2010/09/27/5 Patch
http://openwall.com/lists/oss-security/2010/09/27/7 Patch
http://openwall.com/lists/oss-security/2010/10/03/1 Patch
http://openwall.com/lists/oss-security/2010/10/25/2 Patch
http://secunia.com/advisories/49711
http://security.gentoo.org/glsa/glsa-201206-31.xml
http://www.openwall.com/lists/oss-security/2010/09/21/11
http://www.openwall.com/lists/oss-security/2010/09/24/2
https://bugzilla.redhat.com/show_bug.cgi?id=641361 Patch
http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a
http://openwall.com/lists/oss-security/2010/09/21/10
http://openwall.com/lists/oss-security/2010/09/21/3 Patch
http://openwall.com/lists/oss-security/2010/09/21/8 Patch
http://openwall.com/lists/oss-security/2010/09/21/9
http://openwall.com/lists/oss-security/2010/09/27/10
http://openwall.com/lists/oss-security/2010/09/27/4 Patch
http://openwall.com/lists/oss-security/2010/09/27/5 Patch
http://openwall.com/lists/oss-security/2010/09/27/7 Patch
http://openwall.com/lists/oss-security/2010/10/03/1 Patch
http://openwall.com/lists/oss-security/2010/10/25/2 Patch
http://secunia.com/advisories/49711
http://security.gentoo.org/glsa/glsa-201206-31.xml
http://www.openwall.com/lists/oss-security/2010/09/21/11
http://www.openwall.com/lists/oss-security/2010/09/24/2
https://bugzilla.redhat.com/show_bug.cgi?id=641361 Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:linux-pam:linux-pam:1.1.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:18

Type Values Removed Values Added
References () http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a - () http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a -
References () http://openwall.com/lists/oss-security/2010/09/21/10 - () http://openwall.com/lists/oss-security/2010/09/21/10 -
References () http://openwall.com/lists/oss-security/2010/09/21/3 - Patch () http://openwall.com/lists/oss-security/2010/09/21/3 - Patch
References () http://openwall.com/lists/oss-security/2010/09/21/8 - Patch () http://openwall.com/lists/oss-security/2010/09/21/8 - Patch
References () http://openwall.com/lists/oss-security/2010/09/21/9 - () http://openwall.com/lists/oss-security/2010/09/21/9 -
References () http://openwall.com/lists/oss-security/2010/09/27/10 - () http://openwall.com/lists/oss-security/2010/09/27/10 -
References () http://openwall.com/lists/oss-security/2010/09/27/4 - Patch () http://openwall.com/lists/oss-security/2010/09/27/4 - Patch
References () http://openwall.com/lists/oss-security/2010/09/27/5 - Patch () http://openwall.com/lists/oss-security/2010/09/27/5 - Patch
References () http://openwall.com/lists/oss-security/2010/09/27/7 - Patch () http://openwall.com/lists/oss-security/2010/09/27/7 - Patch
References () http://openwall.com/lists/oss-security/2010/10/03/1 - Patch () http://openwall.com/lists/oss-security/2010/10/03/1 - Patch
References () http://openwall.com/lists/oss-security/2010/10/25/2 - Patch () http://openwall.com/lists/oss-security/2010/10/25/2 - Patch
References () http://secunia.com/advisories/49711 - () http://secunia.com/advisories/49711 -
References () http://security.gentoo.org/glsa/glsa-201206-31.xml - () http://security.gentoo.org/glsa/glsa-201206-31.xml -
References () http://www.openwall.com/lists/oss-security/2010/09/21/11 - () http://www.openwall.com/lists/oss-security/2010/09/21/11 -
References () http://www.openwall.com/lists/oss-security/2010/09/24/2 - () http://www.openwall.com/lists/oss-security/2010/09/24/2 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=641361 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=641361 - Patch

07 Nov 2023, 02:05

Type Values Removed Values Added
Summary The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435. The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.

Information

Published : 2011-01-24 18:00

Updated : 2024-11-21 01:18


NVD link : CVE-2010-3430

Mitre link : CVE-2010-3430

CVE.ORG link : CVE-2010-3430


JSON object : View

Products Affected

linux-pam

  • linux-pam