ID CVE-2002-1160
Summary The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 18-10-2016 - 02:24)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
redhat via4
advisories
  • rhsa
    id RHSA-2003:028
  • rhsa
    id RHSA-2003:035
refmap via4
bid 6753
bugtraq 20021214 BDT_AV200212140001: Insecure default: Using pam_xauth for su from sh-utils package
cert-vn VU#911505
conectiva CLA-2003:693
mandrake MDKSA-2003:017
sunalert 55760
xf linux-pamxauth-gain-privileges(11254)
Last major update 18-10-2016 - 02:24
Published 19-02-2003 - 05:00
Last modified 18-10-2016 - 02:24
Back to Top