First published: Mon Nov 01 2010(Updated: )
Pluggable Authentication Modules (PAM) provide a system whereby<br>administrators can set up authentication policies without having to<br>recompile programs that handle authentication.<br>It was discovered that the pam_namespace module executed the external<br>script namespace.init with an unchanged environment inherited from an<br>application calling PAM. In cases where such an environment was untrusted<br>(for example, when pam_namespace was configured for setuid applications<br>such as su or sudo), a local, unprivileged user could possibly use this<br>flaw to escalate their privileges. (CVE-2010-3853)<br>It was discovered that the pam_mail module used root privileges while<br>accessing users' files. In certain configurations, a local, unprivileged<br>user could use this flaw to obtain limited information about files or<br>directories that they do not have access to. (CVE-2010-3435)<br>It was discovered that the pam_xauth module did not verify the return<br>values of the setuid() and setgid() system calls. A local, unprivileged<br>user could use this flaw to execute the xauth command with root privileges<br>and make it read an arbitrary input file. (CVE-2010-3316)<br>Red Hat would like to thank Sebastian Krahmer of the SuSE Security Team for<br>reporting the CVE-2010-3435 issue.<br>All pam users should upgrade to these updated packages, which contain<br>backported patches to correct these issues.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pam | <0.99.6.2-6.el5_5.2 | 0.99.6.2-6.el5_5.2 |
redhat/pam | <0.99.6.2-6.el5_5.2 | 0.99.6.2-6.el5_5.2 |
redhat/pam-devel | <0.99.6.2-6.el5_5.2 | 0.99.6.2-6.el5_5.2 |
redhat/pam-devel | <0.99.6.2-6.el5_5.2 | 0.99.6.2-6.el5_5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0819 is critical due to the potential for executing arbitrary external scripts.
To fix RHSA-2010:0819, update the pam and pam-devel packages to version 0.99.6.2-6.el5_5.2 or later.
RHSA-2010:0819 affects Red Hat Enterprise Linux systems using the pam and pam-devel packages versions below 0.99.6.2-6.el5_5.2.
The vulnerability in RHSA-2010:0819 may allow an attacker to gain elevated privileges by executing unwanted external scripts.
There are no effective workarounds for RHSA-2010:0819; the best course of action is to apply the update as soon as possible.