4.7 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
5.5 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
10.1%
The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user’s home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | pam | < 1.1.3-1 | pam_1.1.3-1_all.deb |
Debian | 11 | all | pam | < 1.1.3-1 | pam_1.1.3-1_all.deb |
Debian | 999 | all | pam | < 1.1.3-1 | pam_1.1.3-1_all.deb |
Debian | 13 | all | pam | < 1.1.3-1 | pam_1.1.3-1_all.deb |