First published: Wed Feb 19 2003(Updated: )
The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =7.2 | |
Red Hat Linux | =8.0 | |
Red Hat Linux | =7.3 | |
Red Hat Linux | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1160 has a high severity rating as it can lead to local privilege escalation, allowing users to gain root access.
To fix CVE-2002-1160, change the configuration of the pam_xauth module to prevent the forwarding of MIT-Magic-Cookies.
CVE-2002-1160 affects multiple versions of Red Hat Linux, including 7.1, 7.2, 7.3, and 8.0.
CVE-2002-1160 cannot be exploited remotely as it requires local access to the system.
The impact of exploiting CVE-2002-1160 includes the potential for local users to gain unauthorized root privileges on the system.