The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat linux 7.1 |
||
redhat linux 7.2 |
||
redhat linux 7.3 |
||
redhat linux 8.0 |