Vulnerability Description
The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux-Pam | Linux-Pam | <= 1.1.1 |
References
- http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f300
- http://lists.vmware.com/pipermail/security-announce/2011/000126.html
- http://openwall.com/lists/oss-security/2010/08/16/2
- http://openwall.com/lists/oss-security/2010/09/21/3Patch
- http://openwall.com/lists/oss-security/2010/09/21/8Patch
- http://openwall.com/lists/oss-security/2010/09/27/10
- http://openwall.com/lists/oss-security/2010/09/27/4Patch
- http://openwall.com/lists/oss-security/2010/09/27/5Patch
- http://openwall.com/lists/oss-security/2010/09/27/7Patch
- http://openwall.com/lists/oss-security/2010/10/25/2Patch
- http://secunia.com/advisories/49711
- http://security.gentoo.org/glsa/glsa-201206-31.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:220
- http://www.openwall.com/lists/oss-security/2010/09/24/2Patch
- http://www.redhat.com/support/errata/RHSA-2010-0819.html
FAQ
What is CVE-2010-3316?
CVE-2010-3316 is a vulnerability with a CVSS score of 3.3 (LOW). The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might al...
How severe is CVE-2010-3316?
CVE-2010-3316 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-3316?
Check the references section above for vendor advisories and patch information. Affected products include: Linux-Pam Linux-Pam.