RHEL 2.1 : pam (RHSA-2003:028)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated PAM packages are now available. These packages correct a bug
in pam_xauth's handling of authorization data for the root user.

[Updated 12 March 2003] Added packages for Red Hat Enterprise Linux ES
and Red Hat Enterprise Linux WS

The pam_xauth module is used to forward xauth information from user to
user in applications such as the su command.

Andreas Beck discovered that pam_xauth will forward authorization
information from the root account to unprivileged users. This could be
used by a local attacker to gain access to an administrator's X
session. To exploit this vulnerability the attacker would have to get
the administrator, as root, to use su to access the account belonging
to the attacker.

Users of pam_xauth are advised to upgrade to these errata packages
which contain a patch which adds ACL (access control list)
functionality to pam_xauth and disallows root forwarding by default.

Thanks to Andreas Beck for reporting this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2002-1160.html
http://www.nessus.org/u?2dc810fc
http://rhn.redhat.com/errata/RHSA-2003-028.html

Solution :

Update the affected pam and / or pam-devel packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12356 ()

Bugtraq ID:

CVE ID: CVE-2002-1160