6.9
CVSSv2

CVE-2011-3628

Published: 15/04/2014 Updated: 16/04/2014
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules prior to 1.1.3-2ubuntu2.1 on Ubuntu 11.10, prior to 1.1.2-2ubuntu8.4 on Ubuntu 11.04, prior to 1.1.1-4ubuntu2.4 on Ubuntu 10.10, prior to 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and prior to 0.99.7.1-5ubuntu6.5 on Ubuntu 8.04 LTS, when using certain configurations such as "session optional pam_motd.so", allows local users to gain privileges by modifying the PATH environment variable to reference a malicious command, as demonstrated via uname.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical libpam-modules 1.1.2

canonical libpam-modules 0.9.7

canonical ubuntu linux 8.04

canonical ubuntu linux 10.04

canonical ubuntu linux 10.10

canonical ubuntu linux 11.04

canonical libpam-modules 1.1.1

canonical libpam-modules 1.1.3

canonical ubuntu linux 11.10

Vendor Advisories

Debian Bug report logs - #670076 pam: CVE-2011-3628 - pam_motd does not sanitize environment Package: src:pam; Maintainer for src:pam is Steve Langasek <vorlon@debianorg>; Reported by: Arne Wichmann <aw@linuxde> Date: Sun, 22 Apr 2012 18:57:07 UTC Severity: normal Tags: security Done: Michael Gilbert <mgilbert ...
PAM could be made to crash or run programs as an administrator ...