4.9
CVSSv2

CVE-2010-4706

Published: 24/01/2011 Updated: 07/11/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and previous versions does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.

Vulnerable Product Search on Vulmon Subscribe to Product

linux-pam linux-pam 0.99.1.0

linux-pam linux-pam 0.99.2.0

linux-pam linux-pam 0.99.2.1

linux-pam linux-pam 0.99.3.0

linux-pam linux-pam 0.99.4.0

linux-pam linux-pam 0.99.5.0

linux-pam linux-pam 0.99.6.0

linux-pam linux-pam 0.99.6.1

linux-pam linux-pam 0.99.6.2

linux-pam linux-pam 0.99.6.3

linux-pam linux-pam 0.99.7.0

linux-pam linux-pam 0.99.7.1

linux-pam linux-pam 0.99.8.0

linux-pam linux-pam 0.99.8.1

linux-pam linux-pam 0.99.9.0

linux-pam linux-pam 0.99.10.0

linux-pam linux-pam 1.0.0

linux-pam linux-pam 1.0.1

linux-pam linux-pam 1.0.2

linux-pam linux-pam 1.0.3

linux-pam linux-pam 1.0.4

linux-pam linux-pam 1.1.0

linux-pam linux-pam 1.1.1

linux-pam linux-pam

Vendor Advisories

Debian Bug report logs - #611136 CVE-2010-4708: pam_env reads env variables from user file by default Package: pam; Maintainer for pam is Steve Langasek <vorlon@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 25 Jan 2011 21:45:02 UTC Severity: important Tags: confirmed, patch, security, upstr ...
An attacker could cause PAM to read or delete arbitrary files or cause it to crash ...
The USN-1140-1 PAM update caused cron to stop working ...