Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-3316

Опубликовано: 24 янв. 2011
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 3.3

Описание

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

1.1.2-2ubuntu6
hardy

released

0.99.7.1-5ubuntu6.3
karmic

ignored

end of life
lucid

released

1.1.1-2ubuntu5.2
maverick

released

1.1.1-4ubuntu2.2
natty

not-affected

1.1.2-2ubuntu6
upstream

released

1.1.2

Показывать по

EPSS

Процентиль: 23%
0.00072
Низкий

3.3 Low

CVSS2

Связанные уязвимости

redhat
почти 15 лет назад

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

nvd
больше 14 лет назад

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

debian
больше 14 лет назад

The run_coprocess function in pam_xauth.c in the pam_xauth module in L ...

github
около 3 лет назад

The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.

fstec
больше 10 лет назад

Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 23%
0.00072
Низкий

3.3 Low

CVSS2