Show filters
28 Total Results
Displaying 21-28 of 28
Sort by:
Attacker Value
Unknown
CVE-2010-3430
Disclosure Date: January 24, 2011 (last updated November 08, 2023)
The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
0
Attacker Value
Unknown
CVE-2010-3435
Disclosure Date: January 24, 2011 (last updated October 04, 2023)
The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.
0
Attacker Value
Unknown
CVE-2010-3316
Disclosure Date: January 24, 2011 (last updated October 04, 2023)
The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.
0
Attacker Value
Unknown
CVE-2009-0579
Disclosure Date: April 16, 2009 (last updated October 04, 2023)
Linux-PAM before 1.0.4 does not enforce the minimum password age (MINDAYS) as specified in /etc/shadow, which allows local users to bypass intended security policy and change their passwords sooner than specified.
0
Attacker Value
Unknown
CVE-2009-0887
Disclosure Date: March 12, 2009 (last updated October 04, 2023)
Integer signedness error in the _pam_StrTok function in libpam/pam_misc.c in Linux-PAM (aka pam) 1.0.3 and earlier, when a configuration file contains non-ASCII usernames, might allow remote attackers to cause a denial of service, and might allow remote authenticated users to obtain login access with a different user's non-ASCII username, via a login attempt.
0
Attacker Value
Unknown
CVE-2007-0003
Disclosure Date: January 23, 2007 (last updated October 04, 2023)
pam_unix.so in Linux-PAM 0.99.7.0 allows context-dependent attackers to log into accounts whose password hash, as stored in /etc/passwd or /etc/shadow, has only two characters.
0
Attacker Value
Unknown
CVE-2003-0388
Disclosure Date: July 24, 2003 (last updated February 22, 2025)
pam_wheel in Linux-PAM 0.78, with the trust option enabled and the use_uid option disabled, allows local users to spoof log entries and gain privileges by causing getlogin() to return a spoofed user name.
0
Attacker Value
Unknown
CVE-2000-0668
Disclosure Date: July 27, 2000 (last updated February 22, 2025)
pam_console PAM module in Linux systems allows a user to access the system console and reboot the system when a display manager such as gdm or kdm has XDMCP enabled.
0