CVE-2010-4706Linux-pam vulnerability

8 documents7 sources
Severity
4.9MEDIUMNVD
EPSS
0.0%
top 84.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 24
Latest updateMay 14

Description

The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.

CVSS vector

AV:L/AC:L/C:N/I:N/A:CExploitability: 3.9 | Impact: 6.9

Affected Packages3 packages

NVDlinux-pam/linux-pam1.1.2+23
debiandebian/pam< pam 1.1.3-1 (bookworm)
Debianpam/pam< 1.1.3-1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-34fx-r4jh-7jxc: The pam_sm_close_session function in pam_xauth2022-05-14
OSV
CVE-2010-4706: The pam_sm_close_session function in pam_xauth2011-01-24

📋Vendor Advisories

4
Ubuntu
PAM regression2011-05-31
Ubuntu
PAM vulnerabilities2011-05-30
Red Hat
pam: pam_xauth: Improper handling of failure to determine certain target uid2010-10-03
Debian
CVE-2010-4706: pam - The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linu...2010

💬Community

1
Bugzilla
CVE-2010-4706 pam: pam_xauth: Improper handling of failure to determine certain target uid2011-01-25
CVE-2010-4706 — Linux-pam vulnerability | cvebase