3.3
CVSSv2

CVE-2010-3316

Published: 24/01/2011 Updated: 13/02/2023
CVSS v2 Base Score: 3.3 | Impact Score: 4.9 | Exploitability Score: 3.4
VMScore: 294
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) prior to 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

Vulnerable Product Search on Vulmon Subscribe to Product

linux-pam linux-pam 0.99.1.0

linux-pam linux-pam 0.99.2.0

linux-pam linux-pam 0.99.2.1

linux-pam linux-pam 0.99.3.0

linux-pam linux-pam 0.99.4.0

linux-pam linux-pam 0.99.5.0

linux-pam linux-pam 0.99.6.0

linux-pam linux-pam 0.99.6.1

linux-pam linux-pam 0.99.6.2

linux-pam linux-pam 0.99.6.3

linux-pam linux-pam 0.99.7.0

linux-pam linux-pam 0.99.7.1

linux-pam linux-pam 0.99.8.0

linux-pam linux-pam 0.99.8.1

linux-pam linux-pam 0.99.9.0

linux-pam linux-pam 0.99.10.0

linux-pam linux-pam 1.0.0

linux-pam linux-pam 1.0.1

linux-pam linux-pam 1.0.2

linux-pam linux-pam 1.0.3

linux-pam linux-pam 1.0.4

linux-pam linux-pam 1.1.0

linux-pam linux-pam

Vendor Advisories

Debian Bug report logs - #599832 CVE-2010-3316 CVE-2010-3430 CVE-2010-3431 CVE-2010-3435 Package: pam; Maintainer for pam is Steve Langasek <vorlon@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 11 Oct 2010 17:54:05 UTC Severity: important Tags: security Fixed in version pam/113-1 Done: ...
Debian Bug report logs - #608273 CVE-2010-3853: pam_namespace executes namespaceinit with service's environment Package: pam; Maintainer for pam is Steve Langasek <vorlon@debianorg>; Reported by: Giuseppe Iuculano <iuculano@debianorg> Date: Wed, 29 Dec 2010 15:18:02 UTC Severity: serious Tags: patch, security Fix ...
An attacker could cause PAM to read or delete arbitrary files or cause it to crash ...
The USN-1140-1 PAM update caused cron to stop working ...