Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-4706

Опубликовано: 24 янв. 2011
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.9

Описание

The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

1.1.3-1ubuntu2
hardy

released

0.99.7.1-5ubuntu6.3
karmic

ignored

end of life
lucid

released

1.1.1-2ubuntu5.2
maverick

released

1.1.1-4ubuntu2.2
natty

released

1.1.2-2ubuntu8.2
upstream

released

1.1.3

Показывать по

EPSS

Процентиль: 16%
0.00049
Низкий

4.9 Medium

CVSS2

Связанные уязвимости

redhat
около 15 лет назад

The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.

nvd
почти 15 лет назад

The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.

debian
почти 15 лет назад

The pam_sm_close_session function in pam_xauth.c in the pam_xauth modu ...

github
больше 3 лет назад

The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.

EPSS

Процентиль: 16%
0.00049
Низкий

4.9 Medium

CVSS2