CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
5.1%
The pam_env module in Linux-PAM (aka pam) 1.1.2 and earlier reads the .pam_environment file in a user’s home directory, which might allow local users to run programs with an unintended environment by executing a program that relies on the pam_env PAM check.
Vendor | Product | Version | CPE |
---|---|---|---|
linux-pam | linux-pam | * | cpe:2.3:a:linux-pam:linux-pam:*:*:*:*:*:*:*:* |
linux-pam | linux-pam | 0.99.1.0 | cpe:2.3:a:linux-pam:linux-pam:0.99.1.0:*:*:*:*:*:*:* |
linux-pam | linux-pam | 0.99.2.0 | cpe:2.3:a:linux-pam:linux-pam:0.99.2.0:*:*:*:*:*:*:* |
linux-pam | linux-pam | 0.99.2.1 | cpe:2.3:a:linux-pam:linux-pam:0.99.2.1:*:*:*:*:*:*:* |
linux-pam | linux-pam | 0.99.3.0 | cpe:2.3:a:linux-pam:linux-pam:0.99.3.0:*:*:*:*:*:*:* |
linux-pam | linux-pam | 0.99.4.0 | cpe:2.3:a:linux-pam:linux-pam:0.99.4.0:*:*:*:*:*:*:* |
linux-pam | linux-pam | 0.99.5.0 | cpe:2.3:a:linux-pam:linux-pam:0.99.5.0:*:*:*:*:*:*:* |
linux-pam | linux-pam | 0.99.6.0 | cpe:2.3:a:linux-pam:linux-pam:0.99.6.0:*:*:*:*:*:*:* |
linux-pam | linux-pam | 0.99.6.1 | cpe:2.3:a:linux-pam:linux-pam:0.99.6.1:*:*:*:*:*:*:* |
linux-pam | linux-pam | 0.99.6.2 | cpe:2.3:a:linux-pam:linux-pam:0.99.6.2:*:*:*:*:*:*:* |
openwall.com/lists/oss-security/2010/09/27/7
pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.8.xml?r1=1.7&r2=1.8
pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_env/pam_env.c?r1=1.22&r2=1.23
secunia.com/advisories/49711
security.gentoo.org/glsa/glsa-201206-31.xml
www.securityfocus.com/bid/46046
bugzilla.redhat.com/show_bug.cgi?id=641335
exchange.xforce.ibmcloud.com/vulnerabilities/65037