Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-3628

Опубликовано: 15 апр. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.9

Описание

Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.04 LTS, when using certain configurations such as "session optional pam_motd.so", allows local users to gain privileges by modifying the PATH environment variable to reference a malicious command, as demonstrated via uname.

РелизСтатусПримечание
devel

released

1.1.3-2ubuntu2.1
hardy

not-affected

0.99.7.1-5ubuntu6.4
lucid

released

1.1.1-2ubuntu5.4
maverick

released

1.1.1-4ubuntu2.4
natty

released

1.1.2-2ubuntu8.4
oneiric

released

1.1.3-2ubuntu2.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 16%
0.00051
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

nvd
почти 12 лет назад

Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.04 LTS, when using certain configurations such as "session optional pam_motd.so", allows local users to gain privileges by modifying the PATH environment variable to reference a malicious command, as demonstrated via uname.

debian
почти 12 лет назад

Untrusted search path vulnerability in pam_motd (aka the MOTD module) ...

github
больше 3 лет назад

Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.04 LTS, when using certain configurations such as "session optional pam_motd.so", allows local users to gain privileges by modifying the PATH environment variable to reference a malicious command, as demonstrated via uname.

EPSS

Процентиль: 16%
0.00051
Низкий

6.9 Medium

CVSS2