First published: Tue Sep 21 2010(Updated: )
It was reported that pam_env and pam_mail modules do not drop privileges before accessing users' files. This flaw can lead to information disclosure. Issue was partially addressed in Linux-PAM 1.1.2: <a href="http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commitdiff;h=06f882f30092a39a1db867c9744b2ca8d60e4ad6">http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commitdiff;h=06f882f30092a39a1db867c9744b2ca8d60e4ad6</a> The fix in 1.1.2 has some problems though, it fails to switch fsgid/egid and groups (<a href="https://access.redhat.com/security/cve/CVE-2010-3430">CVE-2010-3430</a>) and does not check setfsuid() return value (<a href="https://access.redhat.com/security/cve/CVE-2010-3431">CVE-2010-3431</a>): <a href="http://thread.gmane.org/gmane.comp.security.oss.general/3311/focus=3551">http://thread.gmane.org/gmane.comp.security.oss.general/3311/focus=3551</a> Fix using newly-introduced pam_modutil_drop_priv / pam_modutil_regain_priv was committed in upstream CVS and should be included in 1.1.3: <a href="http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commitdiff;h=843807a3a90f52e7538be756616510730a24739a">http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commitdiff;h=843807a3a90f52e7538be756616510730a24739a</a> Acknowledgements: Red Hat would like to thank Sebastian Krahmer of the SuSE Security Team for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pam | <0:0.99.6.2-6.el5_5.2 | 0:0.99.6.2-6.el5_5.2 |
redhat/pam | <0:1.1.1-4.el6_0.1 | 0:1.1.1-4.el6_0.1 |
Linux-PAM | =0.99.1.0 | |
Linux-PAM | =0.99.2.0 | |
Linux-PAM | =0.99.2.1 | |
Linux-PAM | =0.99.3.0 | |
Linux-PAM | =0.99.4.0 | |
Linux-PAM | =0.99.5.0 | |
Linux-PAM | =0.99.6.0 | |
Linux-PAM | =0.99.6.1 | |
Linux-PAM | =0.99.6.2 | |
Linux-PAM | =0.99.6.3 | |
Linux-PAM | =0.99.7.0 | |
Linux-PAM | =0.99.7.1 | |
Linux-PAM | =0.99.8.0 | |
Linux-PAM | =0.99.8.1 | |
Linux-PAM | =0.99.9.0 | |
Linux-PAM | =0.99.10.0 | |
Linux-PAM | =1.0.0 | |
Linux-PAM | =1.0.1 | |
Linux-PAM | =1.0.2 | |
Linux-PAM | =1.0.3 | |
Linux-PAM | =1.0.4 | |
Linux-PAM | =1.1.0 | |
Linux-PAM | <=1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3435 has a moderate severity due to the potential for information disclosure.
To remediate CVE-2010-3435, upgrade to the patched version of the pam package that addresses this vulnerability.
The pam_env and pam_mail modules are affected by CVE-2010-3435, leading to privilege escalation risks.
Versions of pam before 0:0.99.6.2-6.el5_5.2 and 0:1.1.1-4.el6_0.1 are vulnerable to CVE-2010-3435.
CVE-2010-3435 primarily affects Red Hat-based distributions due to vulnerabilities in the pam package.