Vulnerabilites related to linux-pam - linux-pam
cve-2010-4707
Vulnerability from cvelistv5
Published
2011-01-24 18:00
Modified
2024-08-07 03:55
Severity ?
Summary
The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:55:34.485Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "linuxpam-checkacl-dos(65036)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65036",
               },
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/10/03/1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9",
               },
               {
                  name: "46045",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/46045",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-09-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-16T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "linuxpam-checkacl-dos(65036)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65036",
            },
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/10/03/1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9",
            },
            {
               name: "46045",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/46045",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2010-4707",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "linuxpam-checkacl-dos(65036)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65036",
                  },
                  {
                     name: "GLSA-201206-31",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
                  },
                  {
                     name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2010/10/03/1",
                  },
                  {
                     name: "http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9",
                     refsource: "CONFIRM",
                     url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9",
                  },
                  {
                     name: "46045",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/46045",
                  },
                  {
                     name: "49711",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/49711",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2010-4707",
      datePublished: "2011-01-24T18:00:00",
      dateReserved: "2011-01-24T00:00:00",
      dateUpdated: "2024-08-07T03:55:34.485Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-3148
Vulnerability from cvelistv5
Published
2012-07-22 17:00
Modified
2024-08-06 23:22
Severity ?
Summary
Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T23:22:27.612Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469",
               },
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  name: "USN-1237-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1237-1",
               },
               {
                  name: "46583",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/46583",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=caf5e7f61c8d9288daa49b4f61962e6b1239121d",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-10-24T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2014-02-26T14:57:02",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469",
            },
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               name: "USN-1237-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1237-1",
            },
            {
               name: "46583",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/46583",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=caf5e7f61c8d9288daa49b4f61962e6b1239121d",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2011-3148",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469",
                     refsource: "CONFIRM",
                     url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469",
                  },
                  {
                     name: "GLSA-201206-31",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
                  },
                  {
                     name: "USN-1237-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-1237-1",
                  },
                  {
                     name: "46583",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/46583",
                  },
                  {
                     name: "49711",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/49711",
                  },
                  {
                     name: "http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=caf5e7f61c8d9288daa49b4f61962e6b1239121d",
                     refsource: "CONFIRM",
                     url: "http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=caf5e7f61c8d9288daa49b4f61962e6b1239121d",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2011-3148",
      datePublished: "2012-07-22T17:00:00",
      dateReserved: "2011-08-16T00:00:00",
      dateUpdated: "2024-08-06T23:22:27.612Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-3853
Vulnerability from cvelistv5
Published
2011-01-24 17:00
Modified
2024-08-07 03:26
Severity ?
Summary
pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:26:12.299Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  name: "[security-announce] 20110307 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
               },
               {
                  name: "ADV-2011-0606",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0606",
               },
               {
                  name: "20110308 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
               },
               {
                  name: "MDVSA-2010:220",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
               {
                  name: "RHSA-2010:0891",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=643043",
               },
               {
                  name: "RHSA-2010:0819",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-10-25T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-10T18:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               name: "[security-announce] 20110307 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
            },
            {
               name: "ADV-2011-0606",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0606",
            },
            {
               name: "20110308 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
            },
            {
               name: "MDVSA-2010:220",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
            {
               name: "RHSA-2010:0891",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=643043",
            },
            {
               name: "RHSA-2010:0819",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2010-3853",
      datePublished: "2011-01-24T17:00:00",
      dateReserved: "2010-10-08T00:00:00",
      dateUpdated: "2024-08-07T03:26:12.299Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-3435
Vulnerability from cvelistv5
Published
2011-01-24 17:00
Modified
2024-08-07 03:11
Severity ?
Summary
The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.
References
http://openwall.com/lists/oss-security/2010/09/27/5mailing-list, x_refsource_MLIST
http://openwall.com/lists/oss-security/2010/09/21/3mailing-list, x_refsource_MLIST
http://security.gentoo.org/glsa/glsa-201206-31.xmlvendor-advisory, x_refsource_GENTOO
http://lists.vmware.com/pipermail/security-announce/2011/000126.htmlmailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2011/0606vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/516909/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.openwall.com/lists/oss-security/2010/09/24/2mailing-list, x_refsource_MLIST
http://openwall.com/lists/oss-security/2010/09/27/10mailing-list, x_refsource_MLIST
http://openwall.com/lists/oss-security/2010/09/27/4mailing-list, x_refsource_MLIST
http://www.mandriva.com/security/advisories?name=MDVSA-2010:220vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/49711third-party-advisory, x_refsource_SECUNIA
http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6x_refsource_CONFIRM
http://openwall.com/lists/oss-security/2010/09/27/7mailing-list, x_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2010-0891.htmlvendor-advisory, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=641335x_refsource_CONFIRM
http://openwall.com/lists/oss-security/2010/10/25/2mailing-list, x_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2010-0819.htmlvendor-advisory, x_refsource_REDHAT
http://www.vmware.com/security/advisories/VMSA-2011-0004.htmlx_refsource_CONFIRM
http://openwall.com/lists/oss-security/2010/09/27/8mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:11:44.348Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/5",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/3",
               },
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  name: "[security-announce] 20110307 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
               },
               {
                  name: "ADV-2011-0606",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0606",
               },
               {
                  name: "20110308 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
               },
               {
                  name: "[oss-security] 20100924 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
               },
               {
                  name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/10",
               },
               {
                  name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/4",
               },
               {
                  name: "MDVSA-2010:220",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6",
               },
               {
                  name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/7",
               },
               {
                  name: "RHSA-2010:0891",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
               },
               {
                  name: "[oss-security] 20101025 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/10/25/2",
               },
               {
                  name: "RHSA-2010:0819",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
               },
               {
                  name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/8",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-09-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-10T18:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/5",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/3",
            },
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               name: "[security-announce] 20110307 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
            },
            {
               name: "ADV-2011-0606",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0606",
            },
            {
               name: "20110308 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
            },
            {
               name: "[oss-security] 20100924 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
            },
            {
               name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/10",
            },
            {
               name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/4",
            },
            {
               name: "MDVSA-2010:220",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6",
            },
            {
               name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/7",
            },
            {
               name: "RHSA-2010:0891",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
            },
            {
               name: "[oss-security] 20101025 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/10/25/2",
            },
            {
               name: "RHSA-2010:0819",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
            },
            {
               name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/8",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2010-3435",
      datePublished: "2011-01-24T17:00:00",
      dateReserved: "2010-09-17T00:00:00",
      dateUpdated: "2024-08-07T03:11:44.348Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-3149
Vulnerability from cvelistv5
Published
2012-07-22 17:00
Modified
2024-08-06 23:22
Severity ?
Summary
The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T23:22:27.630Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  name: "USN-1237-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1237-1",
               },
               {
                  name: "46583",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/46583",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=109823cb621c900c07c4b6cdc99070d354d19444",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-10-24T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2014-02-26T14:57:02",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               name: "USN-1237-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1237-1",
            },
            {
               name: "46583",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/46583",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=109823cb621c900c07c4b6cdc99070d354d19444",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2011-3149",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "GLSA-201206-31",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
                  },
                  {
                     name: "USN-1237-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-1237-1",
                  },
                  {
                     name: "46583",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/46583",
                  },
                  {
                     name: "49711",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/49711",
                  },
                  {
                     name: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565",
                     refsource: "CONFIRM",
                     url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565",
                  },
                  {
                     name: "http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=109823cb621c900c07c4b6cdc99070d354d19444",
                     refsource: "CONFIRM",
                     url: "http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=109823cb621c900c07c4b6cdc99070d354d19444",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2011-3149",
      datePublished: "2012-07-22T17:00:00",
      dateReserved: "2011-08-16T00:00:00",
      dateUpdated: "2024-08-06T23:22:27.630Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2009-0579
Vulnerability from cvelistv5
Published
2009-04-16 15:00
Modified
2024-08-07 04:40
Severity ?
Summary
Linux-PAM before 1.0.4 does not enforce the minimum password age (MINDAYS) as specified in /etc/shadow, which allows local users to bypass intended security policy and change their passwords sooner than specified.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T04:40:04.090Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "34728",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34728",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=487216",
               },
               {
                  name: "FEDORA-2009-3204",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html",
               },
               {
                  name: "[pam-list] 20090309 Linux-PAM 1.0.4 released",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/pam-list/2009-March/msg00006.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514437",
               },
               {
                  name: "FEDORA-2009-3231",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html",
               },
               {
                  name: "34733",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34733",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Linux-PAM before 1.0.4 does not enforce the minimum password age (MINDAYS) as specified in /etc/shadow, which allows local users to bypass intended security policy and change their passwords sooner than specified.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2009-04-16T15:00:00Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "34728",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34728",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=487216",
            },
            {
               name: "FEDORA-2009-3204",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html",
            },
            {
               name: "[pam-list] 20090309 Linux-PAM 1.0.4 released",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://www.redhat.com/archives/pam-list/2009-March/msg00006.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514437",
            },
            {
               name: "FEDORA-2009-3231",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html",
            },
            {
               name: "34733",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34733",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2009-0579",
      datePublished: "2009-04-16T15:00:00Z",
      dateReserved: "2009-02-13T00:00:00Z",
      dateUpdated: "2024-08-07T04:40:04.090Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-10041
Vulnerability from cvelistv5
Published
2024-10-23 13:46
Modified
2025-01-02 14:21
Summary
A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.
References
https://access.redhat.com/errata/RHSA-2024:10379vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:11250vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:9941vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-10041vdb-entry, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2319212issue-tracking, x_refsource_REDHAT
Impacted products
Vendor Product Version
Version: 1.6.0   
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 8 Unaffected: 0:1.3.1-36.el8_10   < *
    cpe:/o:redhat:enterprise_linux:8::baseos
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9 Unaffected: 0:1.5.1-21.el9_5   < *
    cpe:/a:redhat:enterprise_linux:9::appstream
    cpe:/o:redhat:enterprise_linux:9::baseos
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9 Unaffected: 0:1.5.1-21.el9_5   < *
    cpe:/a:redhat:enterprise_linux:9::appstream
    cpe:/o:redhat:enterprise_linux:9::baseos
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 9.4 Extended Update Support Unaffected: 0:1.5.1-21.el9_4   < *
    cpe:/a:redhat:rhel_eus:9.4::appstream
    cpe:/o:redhat:rhel_eus:9.4::baseos
Create a notification for this product.
   Red Hat Red Hat Enterprise Linux 7     cpe:/o:redhat:enterprise_linux:7
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-10041",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-23T14:35:15.520510Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-922",
                        description: "CWE-922 Insecure Storage of Sensitive Information",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-04T17:03:47.703Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               collectionURL: "https://github.com/linux-pam/linux-pam",
               defaultStatus: "unaffected",
               packageName: "pam",
               versions: [
                  {
                     lessThan: "1.6.0",
                     status: "affected",
                     version: "1.6.0",
                     versionType: "semver",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8::baseos",
               ],
               defaultStatus: "affected",
               packageName: "pam",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "0:1.3.1-36.el8_10",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:enterprise_linux:9::appstream",
                  "cpe:/o:redhat:enterprise_linux:9::baseos",
               ],
               defaultStatus: "affected",
               packageName: "pam",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "0:1.5.1-21.el9_5",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:enterprise_linux:9::appstream",
                  "cpe:/o:redhat:enterprise_linux:9::baseos",
               ],
               defaultStatus: "affected",
               packageName: "pam",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "0:1.5.1-21.el9_5",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/a:redhat:rhel_eus:9.4::appstream",
                  "cpe:/o:redhat:rhel_eus:9.4::baseos",
               ],
               defaultStatus: "affected",
               packageName: "pam",
               product: "Red Hat Enterprise Linux 9.4 Extended Update Support",
               vendor: "Red Hat",
               versions: [
                  {
                     lessThan: "*",
                     status: "unaffected",
                     version: "0:1.5.1-21.el9_4",
                     versionType: "rpm",
                  },
               ],
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "unknown",
               packageName: "pam",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
         ],
         datePublic: "2024-10-18T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-922",
                     description: "Insecure Storage of Sensitive Information",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-02T14:21:38.425Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "RHSA-2024:10379",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2024:10379",
            },
            {
               name: "RHSA-2024:11250",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2024:11250",
            },
            {
               name: "RHSA-2024:9941",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2024:9941",
            },
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2024-10041",
            },
            {
               name: "RHBZ#2319212",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2319212",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2024-10-16T15:08:30.331000+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2024-10-18T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Pam: libpam: libpam vulnerable to read hashed password",
         workarounds: [
            {
               lang: "en",
               value: "This vulnerability is mitigated if SELinux is in Enforcing mode.\n\nTo verify if SELinux is in Enforcing mode, the output of the `getenforce` command will return `Enforcing', see the example below:\n\n~~~\n$ getenforce\nEnforcing\n~~~\n\nTo more information about SELinux, specifically how to set it to Enforcing mode, see the links below.\n\nhttps://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html-single/using_selinux/index#changing-to-enforcing-mode_changing-selinux-states-and-modes\nhttps://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html-single/using_selinux/index#changing-to-enforcing-mode_changing-selinux-states-and-modes",
            },
         ],
         x_redhatCweChain: "CWE-922: Insecure Storage of Sensitive Information",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2024-10041",
      datePublished: "2024-10-23T13:46:27.963Z",
      dateReserved: "2024-10-16T16:13:54.632Z",
      dateUpdated: "2025-01-02T14:21:38.425Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-2583
Vulnerability from cvelistv5
Published
2014-04-10 14:00
Modified
2024-08-06 10:21
Severity ?
Summary
Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
References
http://www.openwall.com/lists/oss-security/2014/03/24/5mailing-list, x_refsource_MLIST
http://www.securityfocus.com/bid/66493vdb-entry, x_refsource_BID
https://security.gentoo.org/glsa/201605-05vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/57317third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-2935-2vendor-advisory, x_refsource_UBUNTU
http://www.openwall.com/lists/oss-security/2014/03/31/6mailing-list, x_refsource_MLIST
http://www.ubuntu.com/usn/USN-2935-3vendor-advisory, x_refsource_UBUNTU
http://www.ubuntu.com/usn/USN-2935-1vendor-advisory, x_refsource_UBUNTU
https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2014/03/26/10mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T10:21:35.162Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20140324 pam_timestamp internals",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2014/03/24/5",
               },
               {
                  name: "66493",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/66493",
               },
               {
                  name: "GLSA-201605-05",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201605-05",
               },
               {
                  name: "57317",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/57317",
               },
               {
                  name: "USN-2935-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2935-2",
               },
               {
                  name: "[oss-security] 20140331 Re: pam_timestamp internals",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2014/03/31/6",
               },
               {
                  name: "USN-2935-3",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2935-3",
               },
               {
                  name: "USN-2935-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2935-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8",
               },
               {
                  name: "[oss-security] 20140326 Re: pam_timestamp internals",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2014/03/26/10",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-03-24T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-01T15:57:02",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "[oss-security] 20140324 pam_timestamp internals",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2014/03/24/5",
            },
            {
               name: "66493",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/66493",
            },
            {
               name: "GLSA-201605-05",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201605-05",
            },
            {
               name: "57317",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/57317",
            },
            {
               name: "USN-2935-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2935-2",
            },
            {
               name: "[oss-security] 20140331 Re: pam_timestamp internals",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2014/03/31/6",
            },
            {
               name: "USN-2935-3",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2935-3",
            },
            {
               name: "USN-2935-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2935-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8",
            },
            {
               name: "[oss-security] 20140326 Re: pam_timestamp internals",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2014/03/26/10",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2014-2583",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "[oss-security] 20140324 pam_timestamp internals",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2014/03/24/5",
                  },
                  {
                     name: "66493",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/66493",
                  },
                  {
                     name: "GLSA-201605-05",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201605-05",
                  },
                  {
                     name: "57317",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/57317",
                  },
                  {
                     name: "USN-2935-2",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2935-2",
                  },
                  {
                     name: "[oss-security] 20140331 Re: pam_timestamp internals",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2014/03/31/6",
                  },
                  {
                     name: "USN-2935-3",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2935-3",
                  },
                  {
                     name: "USN-2935-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2935-1",
                  },
                  {
                     name: "https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8",
                     refsource: "CONFIRM",
                     url: "https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8",
                  },
                  {
                     name: "[oss-security] 20140326 Re: pam_timestamp internals",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2014/03/26/10",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2014-2583",
      datePublished: "2014-04-10T14:00:00",
      dateReserved: "2014-03-21T00:00:00",
      dateUpdated: "2024-08-06T10:21:35.162Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-27780
Vulnerability from cvelistv5
Published
2020-12-17 23:55
Modified
2024-08-04 16:25
Severity ?
Summary
A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.
References
Impacted products
Vendor Product Version
n/a pam Version: pam 1.5.1
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T16:25:42.438Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=1901094",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "pam",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "pam 1.5.1",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-287",
                     description: "CWE-287",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-12-17T23:55:45",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1901094",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2020-27780",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "pam",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "pam 1.5.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-287",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=1901094",
                     refsource: "MISC",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=1901094",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2020-27780",
      datePublished: "2020-12-17T23:55:45",
      dateReserved: "2020-10-27T00:00:00",
      dateUpdated: "2024-08-04T16:25:42.438Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-3238
Vulnerability from cvelistv5
Published
2015-08-24 14:00
Modified
2024-08-06 05:39
Severity ?
Summary
The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T05:39:32.046Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FEDORA-2015-10830",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html",
               },
               {
                  name: "RHSA-2015:1640",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-1640.html",
               },
               {
                  name: "[oss-security] 20150625 Linux-PAM 1.2.1 released to address CVE-2015-3238",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/06/25/13",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228571",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551",
               },
               {
                  name: "GLSA-201605-05",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201605-05",
               },
               {
                  name: "USN-2935-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2935-2",
               },
               {
                  name: "USN-2935-3",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2935-3",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
               },
               {
                  name: "USN-2935-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2935-1",
               },
               {
                  name: "FEDORA-2015-10848",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html",
               },
               {
                  name: "75428",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/75428",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-06-25T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-12-01T15:57:02",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "FEDORA-2015-10830",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html",
            },
            {
               name: "RHSA-2015:1640",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-1640.html",
            },
            {
               name: "[oss-security] 20150625 Linux-PAM 1.2.1 released to address CVE-2015-3238",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/06/25/13",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228571",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551",
            },
            {
               name: "GLSA-201605-05",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201605-05",
            },
            {
               name: "USN-2935-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2935-2",
            },
            {
               name: "USN-2935-3",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2935-3",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
            },
            {
               name: "USN-2935-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2935-1",
            },
            {
               name: "FEDORA-2015-10848",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html",
            },
            {
               name: "75428",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/75428",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2015-3238",
      datePublished: "2015-08-24T14:00:00",
      dateReserved: "2015-04-10T00:00:00",
      dateUpdated: "2024-08-06T05:39:32.046Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-3430
Vulnerability from cvelistv5
Published
2011-01-24 17:00
Modified
2024-08-07 03:11
Severity ?
Summary
The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:11:44.189Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/5",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/3",
               },
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/10/03/1",
               },
               {
                  name: "[oss-security] 20100924 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/9",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/8",
               },
               {
                  name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/10",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a",
               },
               {
                  name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/4",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/10",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=641361",
               },
               {
                  name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/7",
               },
               {
                  name: "[oss-security] 20101025 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/10/25/2",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2010/09/21/11",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-09-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2012-07-24T09:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/5",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/3",
            },
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/10/03/1",
            },
            {
               name: "[oss-security] 20100924 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/9",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/8",
            },
            {
               name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/10",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a",
            },
            {
               name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/4",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/10",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=641361",
            },
            {
               name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/7",
            },
            {
               name: "[oss-security] 20101025 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/10/25/2",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2010/09/21/11",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2010-3430",
      datePublished: "2011-01-24T17:00:00",
      dateReserved: "2010-09-17T00:00:00",
      dateUpdated: "2024-08-07T03:11:44.189Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-28321
Vulnerability from cvelistv5
Published
2022-09-19 21:10
Modified
2024-08-03 05:48
Severity ?
Summary
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T05:48:37.939Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.suse.com/security/cve/CVE-2022-28321.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.suse.com/show_bug.cgi?id=1197654",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-09-19T21:10:22",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.suse.com/security/cve/CVE-2022-28321.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.suse.com/show_bug.cgi?id=1197654",
            },
         ],
         source: {
            discovery: "INTERNAL",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2022-28321",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/",
                     refsource: "MISC",
                     url: "http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/",
                  },
                  {
                     name: "https://www.suse.com/security/cve/CVE-2022-28321.html",
                     refsource: "MISC",
                     url: "https://www.suse.com/security/cve/CVE-2022-28321.html",
                  },
                  {
                     name: "https://bugzilla.suse.com/show_bug.cgi?id=1197654",
                     refsource: "MISC",
                     url: "https://bugzilla.suse.com/show_bug.cgi?id=1197654",
                  },
               ],
            },
            source: {
               discovery: "INTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2022-28321",
      datePublished: "2022-09-19T21:10:22",
      dateReserved: "2022-04-01T00:00:00",
      dateUpdated: "2024-08-03T05:48:37.939Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-22365
Vulnerability from cvelistv5
Published
2024-02-06 00:00
Modified
2024-08-01 22:43
Severity ?
Summary
linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-22365",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-15T21:07:13.510998Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:52:23.208Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:43:34.704Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/linux-pam/linux-pam",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2024/01/18/3",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-06T07:26:23.317057",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               url: "https://github.com/linux-pam/linux-pam",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2024/01/18/3",
            },
            {
               url: "https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0",
            },
            {
               url: "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2024-22365",
      datePublished: "2024-02-06T00:00:00",
      dateReserved: "2024-01-09T00:00:00",
      dateUpdated: "2024-08-01T22:43:34.704Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-3316
Vulnerability from cvelistv5
Published
2011-01-24 17:00
Modified
2024-08-07 03:03
Severity ?
Summary
The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.
References
http://openwall.com/lists/oss-security/2010/09/27/5mailing-list, x_refsource_MLIST
http://openwall.com/lists/oss-security/2010/09/21/3mailing-list, x_refsource_MLIST
http://security.gentoo.org/glsa/glsa-201206-31.xmlvendor-advisory, x_refsource_GENTOO
http://lists.vmware.com/pipermail/security-announce/2011/000126.htmlmailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2011/0606vdb-entry, x_refsource_VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=637898x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/516909/100/0/threadedmailing-list, x_refsource_BUGTRAQ
https://sourceforge.net/tracker/?func=detail&aid=3028213&group_id=6663&atid=106663x_refsource_MISC
http://www.openwall.com/lists/oss-security/2010/09/24/2mailing-list, x_refsource_MLIST
http://openwall.com/lists/oss-security/2010/08/16/2mailing-list, x_refsource_MLIST
http://openwall.com/lists/oss-security/2010/09/21/8mailing-list, x_refsource_MLIST
http://openwall.com/lists/oss-security/2010/09/27/10mailing-list, x_refsource_MLIST
http://openwall.com/lists/oss-security/2010/09/27/4mailing-list, x_refsource_MLIST
http://www.mandriva.com/security/advisories?name=MDVSA-2010:220vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/49711third-party-advisory, x_refsource_SECUNIA
http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6x_refsource_CONFIRM
http://openwall.com/lists/oss-security/2010/09/27/7mailing-list, x_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2010-0891.htmlvendor-advisory, x_refsource_REDHAT
http://openwall.com/lists/oss-security/2010/10/25/2mailing-list, x_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2010-0819.htmlvendor-advisory, x_refsource_REDHAT
http://www.vmware.com/security/advisories/VMSA-2011-0004.htmlx_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:03:18.998Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/5",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/3",
               },
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  name: "[security-announce] 20110307 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
               },
               {
                  name: "ADV-2011-0606",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0606",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=637898",
               },
               {
                  name: "20110308 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://sourceforge.net/tracker/?func=detail&aid=3028213&group_id=6663&atid=106663",
               },
               {
                  name: "[oss-security] 20100924 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
               },
               {
                  name: "[oss-security] 20100816 Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/08/16/2",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/8",
               },
               {
                  name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/10",
               },
               {
                  name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/4",
               },
               {
                  name: "MDVSA-2010:220",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6",
               },
               {
                  name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/7",
               },
               {
                  name: "RHSA-2010:0891",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
               },
               {
                  name: "[oss-security] 20101025 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/10/25/2",
               },
               {
                  name: "RHSA-2010:0819",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-08-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-10T18:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/5",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/3",
            },
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               name: "[security-announce] 20110307 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
            },
            {
               name: "ADV-2011-0606",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0606",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=637898",
            },
            {
               name: "20110308 VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://sourceforge.net/tracker/?func=detail&aid=3028213&group_id=6663&atid=106663",
            },
            {
               name: "[oss-security] 20100924 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
            },
            {
               name: "[oss-security] 20100816 Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/08/16/2",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/8",
            },
            {
               name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/10",
            },
            {
               name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/4",
            },
            {
               name: "MDVSA-2010:220",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6",
            },
            {
               name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/7",
            },
            {
               name: "RHSA-2010:0891",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
            },
            {
               name: "[oss-security] 20101025 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/10/25/2",
            },
            {
               name: "RHSA-2010:0819",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2010-3316",
      datePublished: "2011-01-24T17:00:00",
      dateReserved: "2010-09-13T00:00:00",
      dateUpdated: "2024-08-07T03:03:18.998Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-3431
Vulnerability from cvelistv5
Published
2011-01-24 17:00
Modified
2024-08-07 03:11
Severity ?
Summary
The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:11:44.353Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/5",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/3",
               },
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/10/03/1",
               },
               {
                  name: "[oss-security] 20100924 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/9",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/8",
               },
               {
                  name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/10",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a",
               },
               {
                  name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/4",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/21/10",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=641361",
               },
               {
                  name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/7",
               },
               {
                  name: "[oss-security] 20101025 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/10/25/2",
               },
               {
                  name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2010/09/21/11",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-09-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2012-07-24T09:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/5",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/3",
            },
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/10/03/1",
            },
            {
               name: "[oss-security] 20100924 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/9",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/8",
            },
            {
               name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/10",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a",
            },
            {
               name: "[oss-security] 20100927 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/4",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/21/10",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=641361",
            },
            {
               name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/7",
            },
            {
               name: "[oss-security] 20101025 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/10/25/2",
            },
            {
               name: "[oss-security] 20100921 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2010/09/21/11",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2010-3431",
      datePublished: "2011-01-24T17:00:00",
      dateReserved: "2010-09-17T00:00:00",
      dateUpdated: "2024-08-07T03:11:44.353Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-4706
Vulnerability from cvelistv5
Published
2011-01-24 18:00
Modified
2024-08-07 03:55
Severity ?
Summary
The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:55:35.062Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=Linux-PAM-1_1_2-3-g05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123",
               },
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/10/03/1",
               },
               {
                  name: "46045",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/46045",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
               {
                  name: "linuxpam-pamsmclosesession-weak-security(65035)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65035",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-09-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-16T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=Linux-PAM-1_1_2-3-g05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123",
            },
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/10/03/1",
            },
            {
               name: "46045",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/46045",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
            {
               name: "linuxpam-pamsmclosesession-weak-security(65035)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65035",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2010-4706",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-3-g05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123",
                     refsource: "CONFIRM",
                     url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-3-g05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123",
                  },
                  {
                     name: "GLSA-201206-31",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
                  },
                  {
                     name: "[oss-security] 20101004 Re: Minor security flaw with pam_xauth",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2010/10/03/1",
                  },
                  {
                     name: "46045",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/46045",
                  },
                  {
                     name: "49711",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/49711",
                  },
                  {
                     name: "linuxpam-pamsmclosesession-weak-security(65035)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65035",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2010-4706",
      datePublished: "2011-01-24T18:00:00",
      dateReserved: "2011-01-24T00:00:00",
      dateUpdated: "2024-08-07T03:55:35.062Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-4708
Vulnerability from cvelistv5
Published
2011-01-24 18:00
Modified
2024-08-07 03:55
Severity ?
Summary
The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user's home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T03:55:34.511Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "linuxpam-pamenv-priv-escalation(65037)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65037",
               },
               {
                  name: "GLSA-201206-31",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.8.xml?r1=1.7&r2=1.8",
               },
               {
                  name: "49711",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49711",
               },
               {
                  name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2010/09/27/7",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.c?r1=1.22&r2=1.23",
               },
               {
                  name: "46046",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/46046",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-09-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user's home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-16T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "linuxpam-pamenv-priv-escalation(65037)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65037",
            },
            {
               name: "GLSA-201206-31",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.8.xml?r1=1.7&r2=1.8",
            },
            {
               name: "49711",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49711",
            },
            {
               name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2010/09/27/7",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.c?r1=1.22&r2=1.23",
            },
            {
               name: "46046",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/46046",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2010-4708",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user's home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "linuxpam-pamenv-priv-escalation(65037)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65037",
                  },
                  {
                     name: "GLSA-201206-31",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
                     refsource: "MISC",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
                  },
                  {
                     name: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.8.xml?r1=1.7&r2=1.8",
                     refsource: "CONFIRM",
                     url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.8.xml?r1=1.7&r2=1.8",
                  },
                  {
                     name: "49711",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/49711",
                  },
                  {
                     name: "[oss-security] 20100928 Re: Minor security flaw with pam_xauth",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2010/09/27/7",
                  },
                  {
                     name: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.c?r1=1.22&r2=1.23",
                     refsource: "CONFIRM",
                     url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.c?r1=1.22&r2=1.23",
                  },
                  {
                     name: "46046",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/46046",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2010-4708",
      datePublished: "2011-01-24T18:00:00",
      dateReserved: "2011-01-24T00:00:00",
      dateUpdated: "2024-08-07T03:55:34.511Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2009-0887
Vulnerability from cvelistv5
Published
2009-03-12 15:00
Modified
2024-08-07 04:48
Severity ?
Summary
Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T04:48:52.627Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&amp%3Br2=1.10&amp%3Bview=patch",
               },
               {
                  name: "MDVSA-2009:077",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:077",
               },
               {
                  name: "[oss-security] 20090305 CVE Request -- pam",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2009/03/05/1",
               },
               {
                  name: "FEDORA-2009-3204",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html",
               },
               {
                  name: "linuxpam-pamstrtok-priv-escalation(49110)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49110",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log",
               },
               {
                  name: "34010",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/34010",
               },
               {
                  name: "FEDORA-2009-3231",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html",
               },
               {
                  name: "34733",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/34733",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2009-03-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-16T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&amp%3Br2=1.10&amp%3Bview=patch",
            },
            {
               name: "MDVSA-2009:077",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:077",
            },
            {
               name: "[oss-security] 20090305 CVE Request -- pam",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2009/03/05/1",
            },
            {
               name: "FEDORA-2009-3204",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html",
            },
            {
               name: "linuxpam-pamstrtok-priv-escalation(49110)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49110",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log",
            },
            {
               name: "34010",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/34010",
            },
            {
               name: "FEDORA-2009-3231",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html",
            },
            {
               name: "34733",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/34733",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2009-0887",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&amp;r2=1.10&amp;view=patch",
                     refsource: "CONFIRM",
                     url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&amp;r2=1.10&amp;view=patch",
                  },
                  {
                     name: "MDVSA-2009:077",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:077",
                  },
                  {
                     name: "[oss-security] 20090305 CVE Request -- pam",
                     refsource: "MLIST",
                     url: "http://openwall.com/lists/oss-security/2009/03/05/1",
                  },
                  {
                     name: "FEDORA-2009-3204",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html",
                  },
                  {
                     name: "linuxpam-pamstrtok-priv-escalation(49110)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49110",
                  },
                  {
                     name: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log",
                     refsource: "CONFIRM",
                     url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log",
                  },
                  {
                     name: "34010",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/34010",
                  },
                  {
                     name: "FEDORA-2009-3231",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html",
                  },
                  {
                     name: "34733",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/34733",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2009-0887",
      datePublished: "2009-03-12T15:00:00",
      dateReserved: "2009-03-12T00:00:00",
      dateUpdated: "2024-08-07T04:48:52.627Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2015-08-24 14:59
Modified
2024-11-21 02:28
Summary
The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1640.htmlVendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2015/06/25/13
secalert@redhat.comhttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
secalert@redhat.comhttp://www.securityfocus.com/bid/75428
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2935-1
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2935-2
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2935-3
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1228571
secalert@redhat.comhttps://security.gentoo.org/glsa/201605-05
secalert@redhat.comhttps://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551Exploit
secalert@redhat.comhttps://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/Exploit
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1640.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2015/06/25/13
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/75428
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2935-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2935-2
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2935-3
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1228571
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201605-05
af854a3a-2127-422b-91ae-364da2661108https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551Exploit
af854a3a-2127-422b-91ae-364da2661108https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/Exploit
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "97736CA5-0370-4CA9-B5D4-E157B3E699F5",
                     versionEndIncluding: "1.1.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:sparc-opl_service_processor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AF02A45-1811-44F2-B3C9-90C11F5DF6DF",
                     versionEndIncluding: "1121",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad en la función _unix_run_helper_binary en el módulo pam_unix en Linux-PAM (también conocido como pam) en versiones anteriores a 1.2.1, cuando no es posible acceder directamente a las contraseñas, permite a usuarios locales enumerar los nombres de usuario o causar una denegación de servicio (colgado) a través de una contraseña larga.",
      },
   ],
   id: "CVE-2015-3238",
   lastModified: "2024-11-21T02:28:58.363",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2015-08-24T14:59:04.010",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-1640.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2015/06/25/13",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/75428",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-2935-1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-2935-2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/USN-2935-3",
      },
      {
         source: "secalert@redhat.com",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228571",
      },
      {
         source: "secalert@redhat.com",
         url: "https://security.gentoo.org/glsa/201605-05",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
         ],
         url: "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
         ],
         url: "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161350.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161249.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-1640.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2015/06/25/13",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/75428",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2935-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2935-2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2935-3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1228571",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/201605-05",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-011/?fid=6551",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://www.trustwave.com/Resources/SpiderLabs-Blog/Username-Enumeration-against-OpenSSH-SELinux-with-CVE-2015-3238/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-06 08:15
Modified
2024-11-21 08:56
Summary
linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
Impacted products
Vendor Product Version
linux-pam linux-pam *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B735A60-FB87-4597-BFF4-A6ED201E71A1",
                     versionEndExcluding: "1.6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.",
      },
      {
         lang: "es",
         value: "linux-pam (también conocido como Linux PAM) anterior a 1.6.0 permite a los atacantes provocar una denegación de servicio (proceso de inicio de sesión bloqueado) a través de mkfifo porque la llamada openat (para protect_dir) carece de O_DIRECTORY.",
      },
   ],
   id: "CVE-2024-22365",
   lastModified: "2024-11-21T08:56:07.760",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-06T08:15:52.203",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Mailing List",
            "Patch",
            "Release Notes",
         ],
         url: "http://www.openwall.com/lists/oss-security/2024/01/18/3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
         ],
         url: "https://github.com/linux-pam/linux-pam",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Release Notes",
         ],
         url: "https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Patch",
            "Release Notes",
         ],
         url: "http://www.openwall.com/lists/oss-security/2024/01/18/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
         ],
         url: "https://github.com/linux-pam/linux-pam",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Release Notes",
         ],
         url: "https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2009-04-16 15:12
Modified
2024-11-21 01:00
Severity ?
Summary
Linux-PAM before 1.0.4 does not enforce the minimum password age (MINDAYS) as specified in /etc/shadow, which allows local users to bypass intended security policy and change their passwords sooner than specified.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B4EF54C-CE7D-4CCE-ACF2-3810C7ABFEFB",
                     versionEndIncluding: "1.0.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC8C86C-9FC7-4838-BFD8-90431DEC4946",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Linux-PAM before 1.0.4 does not enforce the minimum password age (MINDAYS) as specified in /etc/shadow, which allows local users to bypass intended security policy and change their passwords sooner than specified.",
      },
      {
         lang: "es",
         value: "Linux-PAM antes de v1.0.4 no aplica la edad mínima de la contraseña (MINDAYS), tal como se especifica en /etc/shadow, lo que permite a usuarios locales eludir la política de seguridad y cambiar sus contraseñas antes de lo especificado.",
      },
   ],
   id: "CVE-2009-0579",
   lastModified: "2024-11-21T01:00:23.523",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: true,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2009-04-16T15:12:57.360",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514437",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/34728",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/34733",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=487216",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.redhat.com/archives/pam-list/2009-March/msg00006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514437",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/34728",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/34733",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=487216",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.redhat.com/archives/pam-list/2009-March/msg00006.html",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vendorComments: [
      {
         comment: "Not vulnerable. This issue did not affect the versions of pam as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.  Only PAM versions 1.x were affected.",
         lastModified: "2009-04-16T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-24 19:00
Modified
2024-11-21 01:21
Severity ?
Summary
The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user's home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C9E7AE-3FFF-4A41-BEB0-2E37B6000901",
                     versionEndIncluding: "1.1.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC8C86C-9FC7-4838-BFD8-90431DEC4946",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBE3BF43-7402-4CC0-A329-C8597A0758C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A39C8AD-FA7C-4C64-AAB7-93CC461E73F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F7BA7CC-F284-40C8-998D-FC70CCAB58D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user's home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.",
      },
      {
         lang: "es",
         value: "El modulo pam_env en Linux-PAM (también conocido como pam) v1.1.2 y anteriores lee el archivo .pam_environment en el directorio home de un usuario, lo que permite a usuarios locales ejecutar programas en un entorno no deseado ejecutando programas que confían en la comprobación pam_env PAM.",
      },
   ],
   id: "CVE-2010-4708",
   lastModified: "2024-11-21T01:21:34.470",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-24T19:00:02.190",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "cve@mitre.org",
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.8.xml?r1=1.7&r2=1.8",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.c?r1=1.22&r2=1.23",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/46046",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65037",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.8.xml?r1=1.7&r2=1.8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.c?r1=1.22&r2=1.23",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/46046",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65037",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-12-18 00:15
Modified
2024-11-21 05:21
Severity ?
Summary
A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.
Impacted products
Vendor Product Version
linux-pam linux-pam *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "693B7D7D-6BD3-4E5F-9E03-048B5BA832E7",
                     versionEndExcluding: "1.5.1",
                     versionStartIncluding: "1.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.",
      },
      {
         lang: "es",
         value: "Se encontró un fallo en Linux-Pam en versiones anteriores a 1.5.1 en la manera en que maneja contraseñas vacías para usuarios inexistentes.&#xa0;Cuando el usuario no existe, PAM intenta autenticarse con root y en el caso de una contraseña vacía, es autenticado con éxito",
      },
   ],
   id: "CVE-2020-27780",
   lastModified: "2024-11-21T05:21:49.307",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-12-18T00:15:14.330",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1901094",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1901094",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "secalert@redhat.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-24 18:00
Modified
2024-11-21 01:19
Severity ?
Summary
pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
References
secalert@redhat.comhttp://lists.vmware.com/pipermail/security-announce/2011/000126.html
secalert@redhat.comhttp://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13Patch
secalert@redhat.comhttp://secunia.com/advisories/49711
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201206-31.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:220
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0819.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0891.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/516909/100/0/threaded
secalert@redhat.comhttp://www.vmware.com/security/advisories/VMSA-2011-0004.html
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0606
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=643043Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.vmware.com/pipermail/security-announce/2011/000126.html
af854a3a-2127-422b-91ae-364da2661108http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49711
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-31.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:220
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0819.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0891.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/516909/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2011-0004.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0606
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=643043Patch



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C9E7AE-3FFF-4A41-BEB0-2E37B6000901",
                     versionEndIncluding: "1.1.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC8C86C-9FC7-4838-BFD8-90431DEC4946",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBE3BF43-7402-4CC0-A329-C8597A0758C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A39C8AD-FA7C-4C64-AAB7-93CC461E73F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F7BA7CC-F284-40C8-998D-FC70CCAB58D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.",
      },
      {
         lang: "es",
         value: "pam_namespace.c en el módulo pam_namespace para Linux-PAM (también conocido como PAM) anterior a v1.1.3 utiliza el entorno de invocación de la aplicación o servicio durante la ejecución de la secuencia de comandos namespace.init, lo que podría permitir a usuarios locales obtener privilegios mediante la ejecución de un programa setuid que se basa en la comprobación de pam_namespace, como lo demuestra el programa sudo.",
      },
   ],
   id: "CVE-2010-3853",
   lastModified: "2024-11-21T01:19:45.497",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-24T18:00:02.173",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0606",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=643043",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0606",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=643043",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-24 19:00
Modified
2024-11-21 01:21
Severity ?
Summary
The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C9E7AE-3FFF-4A41-BEB0-2E37B6000901",
                     versionEndIncluding: "1.1.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC8C86C-9FC7-4838-BFD8-90431DEC4946",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBE3BF43-7402-4CC0-A329-C8597A0758C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A39C8AD-FA7C-4C64-AAB7-93CC461E73F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F7BA7CC-F284-40C8-998D-FC70CCAB58D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.",
      },
      {
         lang: "es",
         value: "La función check_acl en pam_xauth.c en el módulo pam_xauth en Linux-PAM (también conocido como pam) v1.1.2 y anteriores no verifica adecuadamente que un cierto archivo ACL es un archivo regular, lo que permite que usuarios locales provoquen una denegación de servicio (consumo de todos los recursos) a través de un archivo especial.",
      },
   ],
   id: "CVE-2010-4707",
   lastModified: "2024-11-21T01:21:34.313",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-24T19:00:01.957",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/03/1",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/46045",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65036",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/03/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/46045",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65036",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2009-03-12 15:20
Modified
2024-11-21 01:01
Severity ?
Summary
Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.
References
cve@mitre.orghttp://openwall.com/lists/oss-security/2009/03/05/1Exploit
cve@mitre.orghttp://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&amp%3Br2=1.10&amp%3Bview=patch
cve@mitre.orghttp://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log
cve@mitre.orghttp://secunia.com/advisories/34733
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:077
cve@mitre.orghttp://www.securityfocus.com/bid/34010Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/49110
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2009/03/05/1Exploit
af854a3a-2127-422b-91ae-364da2661108http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&amp%3Br2=1.10&amp%3Bview=patch
af854a3a-2127-422b-91ae-364da2661108http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34733
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:077
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34010Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/49110
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C8DB56B-870D-45E3-8216-ADB47FD07B2D",
                     versionEndIncluding: "1.0.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.",
      },
      {
         lang: "es",
         value: "Error de presencia de signo en entero en la función the_pam_StrTok en Linux-PAM (alias pam) 1.0.3 y anteriores, cuando un fichero de configuración contienen nombres de usuario con caracteres non-ASCII, podría permitir a los atacantes remoto causar una denegación de servicios, y podría permitir a usuarios remotos autenticados obtener login de acceso con un nombre de usuario diferente a los usuarios con caracteres non-ASCII, a través de un intento de login.",
      },
   ],
   id: "CVE-2009-0887",
   lastModified: "2024-11-21T01:01:09.247",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.6,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:M/Au:S/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 2.7,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2009-03-12T15:20:50.127",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://openwall.com/lists/oss-security/2009/03/05/1",
      },
      {
         source: "cve@mitre.org",
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&amp%3Br2=1.10&amp%3Bview=patch",
      },
      {
         source: "cve@mitre.org",
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/34733",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:077",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/34010",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49110",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://openwall.com/lists/oss-security/2009/03/05/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?r1=1.9&amp%3Br2=1.10&amp%3Bview=patch",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/libpam/pam_misc.c?view=log",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/34733",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:077",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/34010",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49110",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-0887\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/\n",
         lastModified: "2009-03-13T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-189",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-09-19 22:15
Modified
2024-11-21 06:57
Severity ?
Summary
The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.
Impacted products
Vendor Product Version
linux-pam linux-pam *
opensuse tumbleweed -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CB27F60-F24C-4A17-B9EE-4B20B47244A8",
                     versionEndExcluding: "1.5.2-6.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:tumbleweed:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "107C84EE-5E5C-4C36-A6DA-295144A527E9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.",
      },
      {
         lang: "es",
         value: "El paquete Linux-PAM versiones anteriores a 1.5.2-6.1 para openSUSE Tumbleweed, permite omitir la autenticación en los inicios de sesión SSH. El módulo pam_access.so no restringe correctamente el inicio de sesión si un usuario intenta conectarse desde una dirección IP que no es resoluble por medio de DNS. En tales condiciones, un usuario con acceso denegado a una máquina puede seguir accediendo. NOTA: la relevancia de este problema es limitada en gran medida a openSUSE Tumbleweed y openSUSE Factory; no afecta a Linux-PAM upstream",
      },
   ],
   id: "CVE-2022-28321",
   lastModified: "2024-11-21T06:57:09.883",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-09-19T22:15:10.913",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.suse.com/show_bug.cgi?id=1197654",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.suse.com/security/cve/CVE-2022-28321.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://bugzilla.suse.com/show_bug.cgi?id=1197654",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.suse.com/security/cve/CVE-2022-28321.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-04-10 20:29
Modified
2024-11-21 02:06
Severity ?
Summary
Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
References
cve@mitre.orghttp://secunia.com/advisories/57317Vendor Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/03/24/5
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/03/26/10
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/03/31/6
cve@mitre.orghttp://www.securityfocus.com/bid/66493
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2935-1
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2935-2
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2935-3
cve@mitre.orghttps://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8Exploit, Patch
cve@mitre.orghttps://security.gentoo.org/glsa/201605-05
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/57317Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/03/24/5
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/03/26/10
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/03/31/6
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/66493
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2935-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2935-2
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2935-3
af854a3a-2127-422b-91ae-364da2661108https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201605-05
Impacted products
Vendor Product Version
linux-pam linux-pam 1.1.8



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "90605E61-D799-47D1-AE78-F47D0DCE4CC6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.",
      },
      {
         lang: "es",
         value: "Múltiples vulnerabilidades de salto de directorio en pam_timestamp.c en el módulo pam_timestamp para Linux-PAM (también conocido como pam) 1.1.8 permite a atacantes remotos crear archivos arbitrarios o posiblemente eludir la autenticación a través de un .. (punto punto) en el valor(1) PAM_RUSER para la función get_ruser o en el valor (2) PAM_TTY para la función check_tty, que es utilizada por la función format_timestamp_name.",
      },
   ],
   id: "CVE-2014-2583",
   lastModified: "2024-11-21T02:06:34.500",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-04-10T20:29:20.707",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/57317",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2014/03/24/5",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2014/03/26/10",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.openwall.com/lists/oss-security/2014/03/31/6",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/66493",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2935-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2935-2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-2935-3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.gentoo.org/glsa/201605-05",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/57317",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2014/03/24/5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2014/03/26/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2014/03/31/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/66493",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2935-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2935-2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-2935-3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "https://git.fedorahosted.org/cgit/linux-pam.git/commit/?id=Linux-PAM-1_1_8-32-g9dcead8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.gentoo.org/glsa/201605-05",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-24 18:00
Modified
2024-11-21 01:18
Severity ?
Summary
The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.
References
secalert@redhat.comhttp://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6
secalert@redhat.comhttp://lists.vmware.com/pipermail/security-announce/2011/000126.html
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/3Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/10
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/4Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/5Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/7Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/8
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/10/25/2Patch
secalert@redhat.comhttp://secunia.com/advisories/49711
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201206-31.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:220
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/09/24/2
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0819.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0891.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/516909/100/0/threaded
secalert@redhat.comhttp://www.vmware.com/security/advisories/VMSA-2011-0004.html
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0606
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=641335Patch
af854a3a-2127-422b-91ae-364da2661108http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6
af854a3a-2127-422b-91ae-364da2661108http://lists.vmware.com/pipermail/security-announce/2011/000126.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/3Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/10
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/4Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/5Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/7Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/8
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/10/25/2Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49711
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-31.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:220
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/24/2
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0819.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0891.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/516909/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2011-0004.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0606
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=641335Patch



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D45AB07D-A1B8-4BC0-A249-A594D7895B78",
                     versionEndIncluding: "1.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC8C86C-9FC7-4838-BFD8-90431DEC4946",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBE3BF43-7402-4CC0-A329-C8597A0758C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A39C8AD-FA7C-4C64-AAB7-93CC461E73F2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.",
      },
      {
         lang: "es",
         value: "Los módulos pam_env (1) y (2) pam_mail de Linux-PAM en versiones anteriores a v1.1.2 utiliza privilegios de root durante el acceso de lectura a los archivos y directorios que pertenecen a cuentas de usuario arbitrarias, lo que podría permitir a usuarios locales obtener información sensible de aprovechando esta actividad en el sistema de archivos, como se demuestra por un ataque de enlace simbólico en el archivo pam_environment. en el directorio home del usuario.",
      },
   ],
   id: "CVE-2010-3435",
   lastModified: "2024-11-21T01:18:44.050",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.7,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:M/Au:N/C:C/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-24T18:00:02.033",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/3",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/27/10",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/4",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/5",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/27/8",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/25/2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0606",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/27/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/27/8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/25/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0606",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=641335",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-24 18:00
Modified
2024-11-21 01:18
Severity ?
Summary
The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.
References
secalert@redhat.comhttp://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6
secalert@redhat.comhttp://lists.vmware.com/pipermail/security-announce/2011/000126.html
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/08/16/2
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/3Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/8Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/10
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/4Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/5Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/7Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/10/25/2Patch
secalert@redhat.comhttp://secunia.com/advisories/49711
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201206-31.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:220
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/09/24/2Patch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0819.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0891.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/516909/100/0/threaded
secalert@redhat.comhttp://www.vmware.com/security/advisories/VMSA-2011-0004.html
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0606
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=637898Patch
secalert@redhat.comhttps://sourceforge.net/tracker/?func=detail&aid=3028213&group_id=6663&atid=106663
af854a3a-2127-422b-91ae-364da2661108http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6
af854a3a-2127-422b-91ae-364da2661108http://lists.vmware.com/pipermail/security-announce/2011/000126.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/08/16/2
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/3Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/8Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/10
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/4Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/5Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/7Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/10/25/2Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49711
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-31.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:220
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/24/2Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0819.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0891.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/516909/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2011-0004.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0606
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=637898Patch
af854a3a-2127-422b-91ae-364da2661108https://sourceforge.net/tracker/?func=detail&aid=3028213&group_id=6663&atid=106663



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D45AB07D-A1B8-4BC0-A249-A594D7895B78",
                     versionEndIncluding: "1.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC8C86C-9FC7-4838-BFD8-90431DEC4946",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBE3BF43-7402-4CC0-A329-C8597A0758C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A39C8AD-FA7C-4C64-AAB7-93CC461E73F2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.",
      },
      {
         lang: "es",
         value: "La función run_coprocess en pam_xauth.c en el módulo pam_xauth de Linux-PAM (también conocido por PAM)en la  versiones anteriores a v1.1.2 no comprueba los valores de retorno de la setuid, setgid, y pide setgroups sistema, que podría permitir a usuarios locales leer ficheros arbitrarios por  la ejecución de un programa que se basa en la pam_xauth de la comprobación de PAM.",
      },
   ],
   id: "CVE-2010-3316",
   lastModified: "2024-11-21T01:18:29.823",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 3.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-24T18:00:01.847",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/08/16/2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/3",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/8",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/27/10",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/4",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/5",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/25/2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2011/0606",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=637898",
      },
      {
         source: "secalert@redhat.com",
         url: "https://sourceforge.net/tracker/?func=detail&aid=3028213&group_id=6663&atid=106663",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.vmware.com/pipermail/security-announce/2011/000126.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/08/16/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/27/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/25/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:220",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0819.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0891.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/516909/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/security/advisories/VMSA-2011-0004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0606",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=637898",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://sourceforge.net/tracker/?func=detail&aid=3028213&group_id=6663&atid=106663",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2012-07-22 17:55
Modified
2024-11-21 01:29
Severity ?
Summary
The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "92B08B4D-8A9C-4BF4-94AD-9ED9E86C7138",
                     versionEndIncluding: "1.1.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC8C86C-9FC7-4838-BFD8-90431DEC4946",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBE3BF43-7402-4CC0-A329-C8597A0758C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A39C8AD-FA7C-4C64-AAB7-93CC461E73F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F7BA7CC-F284-40C8-998D-FC70CCAB58D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "56F68CBA-E64A-4085-8902-5EBF9A5349D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B696CDD-C93E-4E88-B2DC-BB9978D879E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).",
      },
      {
         lang: "es",
         value: "La función _expand_arg en el módulo pam_env (modules / pam_env / pam_env.c) en Linux-PAM (también conocido como pam) antes de v1.1.5 no controla correctamente cuando la expansión de la variable de entorno puede desbordarse, lo que permite a usuarios locales provocar una denegación de servicio (el consumo de CPU).",
      },
   ],
   id: "CVE-2011-3149",
   lastModified: "2024-11-21T01:29:50.923",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2012-07-22T17:55:01.103",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=109823cb621c900c07c4b6cdc99070d354d19444",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/46583",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-1237-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=109823cb621c900c07c4b6cdc99070d354d19444",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/46583",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1237-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-10-23 14:15
Modified
2024-12-18 10:15
Summary
A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "20ED7FC4-9FBB-4886-9FF0-BBBCBBE852D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.",
      },
      {
         lang: "es",
         value: "Se encontró una vulnerabilidad en PAM. La información secreta se almacena en la memoria, donde el atacante puede hacer que el programa víctima se ejecute enviando caracteres a su entrada estándar (stdin). Mientras esto ocurre, el atacante puede entrenar al predictor de bifurcaciones para que ejecute una cadena ROP de manera especulativa. Esta falla podría provocar la filtración de contraseñas, como las que se encuentran en /etc/shadow mientras se realizan autenticaciones.",
      },
   ],
   id: "CVE-2024-10041",
   lastModified: "2024-12-18T10:15:05.850",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1,
            impactScore: 3.6,
            source: "secalert@redhat.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-10-23T14:15:03.970",
   references: [
      {
         source: "secalert@redhat.com",
         url: "https://access.redhat.com/errata/RHSA-2024:10379",
      },
      {
         source: "secalert@redhat.com",
         url: "https://access.redhat.com/errata/RHSA-2024:11250",
      },
      {
         source: "secalert@redhat.com",
         url: "https://access.redhat.com/errata/RHSA-2024:9941",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mitigation",
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2024-10041",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2319212",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-922",
            },
         ],
         source: "secalert@redhat.com",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-922",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-24 18:00
Modified
2024-11-21 01:18
Severity ?
Summary
The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
References
secalert@redhat.comhttp://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/10Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/3Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/8Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/9
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/10
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/4Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/5
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/7
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/10/03/1Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/10/25/2Patch
secalert@redhat.comhttp://secunia.com/advisories/49711
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201206-31.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/09/21/11Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/09/24/2
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=641361Patch
af854a3a-2127-422b-91ae-364da2661108http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/10Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/3Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/8Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/9
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/10
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/4Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/5
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/7
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/10/03/1Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/10/25/2Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49711
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-31.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/21/11Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/24/2
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=641361Patch
Impacted products
Vendor Product Version
linux-pam linux-pam 1.1.2



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "56F68CBA-E64A-4085-8902-5EBF9A5349D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.",
      },
      {
         lang: "es",
         value: "La aplicación de escalada de privilegios en los modúlos (1) y (2) pam_mail de Linux-PAM (también conocido como pam) v1.1.2 no comprueba el valor devuelto de la llamada al sistema setfsuid, lo que podría permitir a usuarios locales obtener información sensible  aprovechando un identificador de usuario no deseado, como lo demuestra un ataque de enlace simbólico en el archivo pam_environment en el directorio home del usuario.  NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2010-3435.",
      },
   ],
   id: "CVE-2010-3431",
   lastModified: "2024-11-21T01:18:43.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 1.9,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-24T18:00:01.970",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/10",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/3",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/8",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/21/9",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/27/10",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/4",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/27/5",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/03/1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/25/2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2010/09/21/11",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=641361",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/21/9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/27/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/27/5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/03/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/25/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.openwall.com/lists/oss-security/2010/09/21/11",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=641361",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-24 19:00
Modified
2024-11-21 01:21
Severity ?
Summary
The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C9E7AE-3FFF-4A41-BEB0-2E37B6000901",
                     versionEndIncluding: "1.1.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC8C86C-9FC7-4838-BFD8-90431DEC4946",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBE3BF43-7402-4CC0-A329-C8597A0758C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A39C8AD-FA7C-4C64-AAB7-93CC461E73F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F7BA7CC-F284-40C8-998D-FC70CCAB58D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.",
      },
      {
         lang: "es",
         value: "La función pam_sm_close_session en pam_xauth.c en el módulo pam_xauth en Linux-PAM (también conocido como pam) v1.1.2 y anteriores no maneja adecuadamente una característica para determinar un cierto objetivo UID, lo que permite a usuarios locales borrar archivos no buscados ejecutando un programa que confía en la comprobación del pam_xauth PAM.",
      },
   ],
   id: "CVE-2010-4706",
   lastModified: "2024-11-21T01:21:34.170",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 4.9,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-24T19:00:01.877",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=Linux-PAM-1_1_2-3-g05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/03/1",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/46045",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65035",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=Linux-PAM-1_1_2-3-g05dafc06cd3dfeb7c4b24942e4e1ae33ff75a123",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/03/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/46045",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65035",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-01-24 18:00
Modified
2024-11-21 01:18
Severity ?
Summary
The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
References
secalert@redhat.comhttp://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/10
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/3Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/8Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/21/9
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/10
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/4Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/5Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/09/27/7Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/10/03/1Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2010/10/25/2Patch
secalert@redhat.comhttp://secunia.com/advisories/49711
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201206-31.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/09/21/11
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/09/24/2
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=641361Patch
af854a3a-2127-422b-91ae-364da2661108http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/10
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/3Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/8Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/21/9
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/10
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/4Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/5Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/09/27/7Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/10/03/1Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2010/10/25/2Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49711
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-31.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/21/11
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/24/2
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=641361Patch
Impacted products
Vendor Product Version
linux-pam linux-pam 1.1.2



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "56F68CBA-E64A-4085-8902-5EBF9A5349D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.",
      },
      {
         lang: "es",
         value: "La implementación de la escalada de privilegios en los módulos pam_env (1) y (2) pam_mail de Linux-PAM (también conocido como pam) v1.1.2 no realiza la setfsgid requiere y pide setgroups sistema, que podría permitir a usuarios locales obtener información sensible mediante el aprovechamiento de  permisos de grupo no deseados, como lo demuestra un ataque de enlace simbólico en el archivo pam_environment en el directorio home del usuario.  NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2010-3435.",
      },
   ],
   id: "CVE-2010-3430",
   lastModified: "2024-11-21T01:18:43.363",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.7,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:M/Au:N/C:C/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-01-24T18:00:01.907",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/21/10",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/3",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/8",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/21/9",
      },
      {
         source: "secalert@redhat.com",
         url: "http://openwall.com/lists/oss-security/2010/09/27/10",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/4",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/5",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/03/1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/25/2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2010/09/21/11",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=641361",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/21/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/21/8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/21/9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://openwall.com/lists/oss-security/2010/09/27/10",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/5",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/09/27/7",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/03/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://openwall.com/lists/oss-security/2010/10/25/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2010/09/21/11",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2010/09/24/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=641361",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2012-07-22 17:55
Modified
2024-11-21 01:29
Severity ?
Summary
Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "92B08B4D-8A9C-4BF4-94AD-9ED9E86C7138",
                     versionEndIncluding: "1.1.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B59C70C7-FABE-4A45-A45D-2C7276D698DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA50D8F-D5A8-4123-93CF-E7714571F411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8820C0-1ECB-45AD-A573-5667F0D09776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D416053-0010-4B25-9F7C-6054C51C1685",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97AB578-0E9E-4370-8379-0CD455F2D740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A6147C-CC0A-4C9F-B9A9-E144F2133592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DEF8EC8-0E0A-4C0A-95BE-FB7C23732083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9A9AB1C-FDF8-4E98-8773-387E03CD93E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F94AA92-5854-46B9-8B3C-08FCC5B071CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5C0039-827C-45CD-99BE-95459006CA59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4256C34-DBCA-4FE0-96A5-874D7F00869A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2613D2-33C1-4132-AD9A-68190A59C0F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "08FDE78F-119B-4FC8-BBFA-8048F2CF1227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4A75789-F7EC-4D9C-942A-243DF92E5CA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3753027E-D3A4-45D4-A3A3-2320C48AF6C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6533A629-6351-4831-BBF7-44718262FAF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "516F23F9-25B3-40DB-A3CA-2F1DE0678934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F3ACA7F-D247-439C-8B5E-287EC5D236AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A30E5C3-501D-4DAA-B7F7-E42F98DEDBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEC8C86C-9FC7-4838-BFD8-90431DEC4946",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBE3BF43-7402-4CC0-A329-C8597A0758C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A39C8AD-FA7C-4C64-AAB7-93CC461E73F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F7BA7CC-F284-40C8-998D-FC70CCAB58D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "56F68CBA-E64A-4085-8902-5EBF9A5349D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:linux-pam:linux-pam:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B696CDD-C93E-4E88-B2DC-BB9978D879E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer basado en pila en la función _assemble_line en modules/pam_env/ pam_env.c en Linux-PAM (también conocido como PAM) anterior a v1.1.5 permite a usuarios locales provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de una larga cadena de los espacios en blanco al principio del archivo ~/.pam_environment.",
      },
   ],
   id: "CVE-2011-3148",
   lastModified: "2024-11-21T01:29:50.770",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2012-07-22T17:55:01.057",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=caf5e7f61c8d9288daa49b4f61962e6b1239121d",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/46583",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "cve@mitre.org",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/USN-1237-1",
      },
      {
         source: "cve@mitre.org",
         url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://git.fedorahosted.org/git/?p=linux-pam.git%3Ba=commitdiff%3Bh=caf5e7f61c8d9288daa49b4f61962e6b1239121d",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/46583",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/49711",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201206-31.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/USN-1237-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}