First published: Tue Apr 15 2014(Updated: )
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.04 LTS, when using certain configurations such as "session optional pam_motd.so", allows local users to gain privileges by modifying the PATH environment variable to reference a malicious command, as demonstrated via uname.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =10.10 | |
Ubuntu | =8.04 | |
libpam-modules | =1.1.3 | |
Ubuntu | =11.04 | |
libpam-modules | =1.1.1 | |
Ubuntu | =11.10 | |
libpam-modules | =1.1.2 | |
libpam-modules | =0.9.7 | |
Ubuntu | =10.04 | |
=0.9.7 | ||
=1.1.1 | ||
=1.1.2 | ||
=1.1.3 | ||
=8.04 | ||
=10.04 | ||
=10.10 | ||
=11.04 | ||
=11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3628 has a medium severity rating due to the potential for local privilege escalation.
To fix CVE-2011-3628, upgrade the libpam-modules package to version 1.1.3-2ubuntu2.1 or later on affected Ubuntu versions.
CVE-2011-3628 affects Ubuntu versions 10.04, 10.10, 11.04, and 11.10, as well as their respective libpam-modules versions.
CVE-2011-3628 is classified as an untrusted search path vulnerability in the pam_motd module.
No, CVE-2011-3628 can only be exploited locally, requiring a user with access to the system.