First published: Fri Oct 08 2010(Updated: )
The pam_mail and pam_env modules in Linux-PAM before 1.1.2 did not drop privileges before accessing users' files (<a href="https://access.redhat.com/security/cve/CVE-2010-3435">CVE-2010-3435</a>, see <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2010-3435 pam: pam_env and pam_mail accessing users' file with root privileges" href="show_bug.cgi?id=641335">bug #641335</a>). Privilege dropping was added in 1.1.2, but with couple of issues pointed out by Solar Designer: <a href="http://thread.gmane.org/gmane.comp.security.oss.general/3311/focus=3534">http://thread.gmane.org/gmane.comp.security.oss.general/3311/focus=3534</a> The code fails to switch fsgid/egid and groups (<a href="https://access.redhat.com/security/cve/CVE-2010-3430">CVE-2010-3430</a>) and does not check setfsuid() return value (<a href="https://access.redhat.com/security/cve/CVE-2010-3431">CVE-2010-3431</a>). Fix using newly-introduced pam_modutil_drop_priv / pam_modutil_regain_priv was committed in upstream CVS and should be included in 1.1.3: <a href="http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commitdiff;h=843807a3a90f52e7538be756616510730a24739a">http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commitdiff;h=843807a3a90f52e7538be756616510730a24739a</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux-PAM | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3430 is considered a medium severity vulnerability due to its potential to expose user files.
To fix CVE-2010-3430, upgrade to Linux-PAM version 1.1.2 or later.
CVE-2010-3430 affects Linux-PAM versions prior to 1.1.2.
CVE-2010-3430 can lead to unauthorized access to user files due to privilege escalation.
Yes, CVE-2010-3430 can be exploited by local attackers to gain access to sensitive user files.