CVE-2010-3435 — Linux-pam vulnerability
22 documents9 sources
Severity
4.7MEDIUMNVD
NVD1.9OSV1.9
EPSS
0.1%
top 75.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 24
Latest updateMay 14
Description
The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.
CVSS vector
AV:L/AC:M/C:C/I:N/A:NExploitability: 3.4 | Impact: 6.9
Affected Packages7 packages
Patches
🔴Vulnerability Details
6GHSA▶
GHSA-65hr-mfq3-4rjr: The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1↗2022-05-14
GHSA▶
GHSA-fw5v-fh36-5x5q: The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1↗2022-05-14
GHSA▶
GHSA-h8pg-g57w-hfr9: The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1↗2022-05-14
OSV▶
CVE-2010-3431: The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1↗2011-01-24
OSV
▶
💥Exploits & PoCs
1Exploit-DB▶
RKD Software BarCode ActiveX Control 'BarCodeAx.dll' 4.9 - Remote Stack Buffer Overflow (Metasploit)↗2010-05-09
📋Vendor Advisories
9VMware▶
VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.↗2011-03-07