LOW · 1.9

CVE-2010-3431

The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local user...

Vulnerability Description

The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.

CVSS Score

1.9

LOW

AV:L/AC:M/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
Linux-PamLinux-Pam1.1.2

References

FAQ

What is CVE-2010-3431?

CVE-2010-3431 is a vulnerability with a CVSS score of 1.9 (LOW). The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local user...

How severe is CVE-2010-3431?

CVE-2010-3431 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-3431?

Check the references section above for vendor advisories and patch information. Affected products include: Linux-Pam Linux-Pam.