MEDIUM · 4.7

CVE-2010-3430

The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow loca...

Vulnerability Description

The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.

CVSS Score

4.7

MEDIUM

AV:L/AC:M/Au:N/C:C/I:N/A:N
Confidentiality
COMPLETE
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
Linux-PamLinux-Pam1.1.2

References

FAQ

What is CVE-2010-3430?

CVE-2010-3430 is a vulnerability with a CVSS score of 4.7 (MEDIUM). The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow loca...

How severe is CVE-2010-3430?

CVE-2010-3430 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-3430?

Check the references section above for vendor advisories and patch information. Affected products include: Linux-Pam Linux-Pam.