First published: Thu Oct 14 2010(Updated: )
pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE PAM | <=1.1.2 | |
SUSE PAM | =0.99.1.0 | |
SUSE PAM | =0.99.2.0 | |
SUSE PAM | =0.99.2.1 | |
SUSE PAM | =0.99.3.0 | |
SUSE PAM | =0.99.4.0 | |
SUSE PAM | =0.99.5.0 | |
SUSE PAM | =0.99.6.0 | |
SUSE PAM | =0.99.6.1 | |
SUSE PAM | =0.99.6.2 | |
SUSE PAM | =0.99.6.3 | |
SUSE PAM | =0.99.7.0 | |
SUSE PAM | =0.99.7.1 | |
SUSE PAM | =0.99.8.0 | |
SUSE PAM | =0.99.8.1 | |
SUSE PAM | =0.99.9.0 | |
SUSE PAM | =0.99.10.0 | |
SUSE PAM | =1.0.0 | |
SUSE PAM | =1.0.1 | |
SUSE PAM | =1.0.2 | |
SUSE PAM | =1.0.3 | |
SUSE PAM | =1.0.4 | |
SUSE PAM | =1.1.0 | |
SUSE PAM | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-3853 is considered moderate due to the potential for local users to gain elevated privileges.
To fix CVE-2010-3853, update to Linux-PAM version 1.1.3 or later, which addresses this vulnerability.
CVE-2010-3853 affects local users on systems using vulnerable versions of Linux-PAM prior to 1.1.3.
CVE-2010-3853 exploits the improper handling of the environment by the pam_namespace module in Linux-PAM.
CVE-2010-3853 cannot be exploited remotely as it requires local user access to initiate the attack.