Lucene search

K
cve[email protected]CVE-2010-3853
HistoryJan 24, 2011 - 6:00 p.m.

CVE-2010-3853

2011-01-2418:00:02
web.nvd.nist.gov
33
cve-2010-3853
linux-pam
pam_namespace
security vulnerability
privilege escalation
nvd

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

6.2 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.

Affected configurations

NVD
Node
linux-pamlinux-pamRange1.1.2
OR
linux-pamlinux-pamMatch0.99.1.0
OR
linux-pamlinux-pamMatch0.99.2.0
OR
linux-pamlinux-pamMatch0.99.2.1
OR
linux-pamlinux-pamMatch0.99.3.0
OR
linux-pamlinux-pamMatch0.99.4.0
OR
linux-pamlinux-pamMatch0.99.5.0
OR
linux-pamlinux-pamMatch0.99.6.0
OR
linux-pamlinux-pamMatch0.99.6.1
OR
linux-pamlinux-pamMatch0.99.6.2
OR
linux-pamlinux-pamMatch0.99.6.3
OR
linux-pamlinux-pamMatch0.99.7.0
OR
linux-pamlinux-pamMatch0.99.7.1
OR
linux-pamlinux-pamMatch0.99.8.0
OR
linux-pamlinux-pamMatch0.99.8.1
OR
linux-pamlinux-pamMatch0.99.9.0
OR
linux-pamlinux-pamMatch0.99.10.0
OR
linux-pamlinux-pamMatch1.0.0
OR
linux-pamlinux-pamMatch1.0.1
OR
linux-pamlinux-pamMatch1.0.2
OR
linux-pamlinux-pamMatch1.0.3
OR
linux-pamlinux-pamMatch1.0.4
OR
linux-pamlinux-pamMatch1.1.0
OR
linux-pamlinux-pamMatch1.1.1

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

6.2 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%