The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2011-01-24T17:00:00
Updated: 2024-08-07T03:11:44.348Z
Reserved: 2010-09-17T00:00:00
Link: CVE-2010-3435
Vulnrichment
No data.
NVD
Status : Modified
Published: 2011-01-24T18:00:02.033
Modified: 2024-11-21T01:18:44.050
Link: CVE-2010-3435
Redhat