CVE-2010-3435

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

4.7medium2.0
0246810

CVSS Score: 4.7/10

All CVSS Scores

CVSS 2.0
4.7

Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N

Description

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user’s home directory.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

Vulnerable Software (5)

Type: Configuration

Product: pam

Operating System: ubuntu hardy 8.04

Trait:
{  "fixed": "0.99.7.1-5ubuntu6.3"}

Source: ubuntu

Type: Configuration

Product: pam

Operating System: debian

Trait:
{  "fixed": "1.1.3-1"}

Source: debian

Type: Configuration

Product: pam

Operating System: debian squeeze 6

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: pam

Operating System: debian lenny 5

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Vendor: linux-pam

Product: linux-pam

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:*",      "versionEndIncluding": "1.1.1",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:lin...

Source: nvd