LOW · 3.3

CVE-2010-3316

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might al...

Vulnerability Description

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

CVSS Score

3.3

LOW

AV:L/AC:M/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
Linux-PamLinux-Pam<= 1.1.1

References

FAQ

What is CVE-2010-3316?

CVE-2010-3316 is a vulnerability with a CVSS score of 3.3 (LOW). The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might al...

How severe is CVE-2010-3316?

CVE-2010-3316 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-3316?

Check the references section above for vendor advisories and patch information. Affected products include: Linux-Pam Linux-Pam.