SB2011012401 - Multiple vulnerabilities in git.kernel linux-pam



SB2011012401 - Multiple vulnerabilities in git.kernel linux-pam

Published: January 24, 2011 Updated: August 11, 2020

Security Bulletin ID SB2011012401
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2010-4708)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user's home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.


2) Input validation error (CVE-ID: CVE-2010-4706)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The pam_sm_close_session function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not properly handle a failure to determine a certain target uid, which might allow local users to delete unintended files by executing a program that relies on the pam_xauth PAM check.


3) Resource management error (CVE-ID: CVE-2010-4707)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file.


4) Input validation error (CVE-ID: CVE-2010-3853)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.


Remediation

Install update from vendor's website.

References