Vulnerability Details : CVE-2010-3435
The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.
Exploit prediction scoring system (EPSS) score for CVE-2010-3435
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3435
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.7
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:N/A:N |
3.4
|
6.9
|
NIST |
References for CVE-2010-3435
-
http://openwall.com/lists/oss-security/2010/10/25/2
oss-security - Re: Minor security flaw with pam_xauthPatch
-
http://www.redhat.com/support/errata/RHSA-2010-0891.html
Support
-
http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=06f882f30092a39a1db867c9744b2ca8d60e4ad6
git.altlinux.org
-
http://security.gentoo.org/glsa/glsa-201206-31.xml
Linux-PAM: Multiple vulnerabilities (GLSA 201206-31) — Gentoo security
-
http://lists.vmware.com/pipermail/security-announce/2011/000126.html
[Security-announce] VMSA-2011-0004 VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm
-
http://openwall.com/lists/oss-security/2010/09/27/4
oss-security - Re: Minor security flaw with pam_xauthPatch
-
http://openwall.com/lists/oss-security/2010/09/27/10
oss-security - Re: Minor security flaw with pam_xauth
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:220
mandriva.com
-
http://www.securityfocus.com/archive/1/516909/100/0/threaded
SecurityFocus
-
https://bugzilla.redhat.com/show_bug.cgi?id=641335
641335 – (CVE-2010-3435) CVE-2010-3435 pam: pam_env and pam_mail accessing users' file with root privilegesPatch
-
http://openwall.com/lists/oss-security/2010/09/21/3
oss-security - Re: Minor security flaw with pam_xauthPatch
-
http://www.openwall.com/lists/oss-security/2010/09/24/2
oss-security - Re: Minor security flaw with pam_xauth
-
http://www.vupen.com/english/advisories/2011/0606
Webmail | OVH- OVH
-
http://www.redhat.com/support/errata/RHSA-2010-0819.html
Support
-
http://openwall.com/lists/oss-security/2010/09/27/5
oss-security - Re: Minor security flaw with pam_xauthPatch
-
http://openwall.com/lists/oss-security/2010/09/27/7
oss-security - Re: Minor security flaw with pam_xauthPatch
-
http://openwall.com/lists/oss-security/2010/09/27/8
oss-security - Re: Minor security flaw with pam_xauth
-
http://www.vmware.com/security/advisories/VMSA-2011-0004.html
VMSA-2011-0004.3
Products affected by CVE-2010-3435
- cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:linux-pam:linux-pam:1.1.0:*:*:*:*:*:*:*