4.7

CVE-2010-3435

The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.

Data is provided by the National Vulnerability Database (NVD)
Linux-pamLinux-pam Version <= 1.1.1
Linux-pamLinux-pam Version0.99.1.0
Linux-pamLinux-pam Version0.99.2.0
Linux-pamLinux-pam Version0.99.2.1
Linux-pamLinux-pam Version0.99.3.0
Linux-pamLinux-pam Version0.99.4.0
Linux-pamLinux-pam Version0.99.5.0
Linux-pamLinux-pam Version0.99.6.0
Linux-pamLinux-pam Version0.99.6.1
Linux-pamLinux-pam Version0.99.6.2
Linux-pamLinux-pam Version0.99.6.3
Linux-pamLinux-pam Version0.99.7.0
Linux-pamLinux-pam Version0.99.7.1
Linux-pamLinux-pam Version0.99.8.0
Linux-pamLinux-pam Version0.99.8.1
Linux-pamLinux-pam Version0.99.9.0
Linux-pamLinux-pam Version0.99.10.0
Linux-pamLinux-pam Version1.0.0
Linux-pamLinux-pam Version1.0.1
Linux-pamLinux-pam Version1.0.2
Linux-pamLinux-pam Version1.0.3
Linux-pamLinux-pam Version1.0.4
Linux-pamLinux-pam Version1.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.173
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.7 3.4 6.9
AV:L/AC:M/Au:N/C:C/I:N/A:N