Scientific Linux Security Update : pam on SL5.x i386/x86_64

Medium Nessus Plugin ID 60882

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

It was discovered that the pam_namespace module executed the external script namespace.init with an unchanged environment inherited from an application calling PAM. In cases where such an environment was untrusted (for example, when pam_namespace was configured for setuid applications such as su or sudo), a local, unprivileged user could possibly use this flaw to escalate their privileges. (CVE-2010-3853)

It was discovered that the pam_mail module used root privileges while accessing users' files. In certain configurations, a local, unprivileged user could use this flaw to obtain limited information about files or directories that they do not have access to.
(CVE-2010-3435)

It was discovered that the pam_xauth module did not verify the return values of the setuid() and setgid() system calls. A local, unprivileged user could use this flaw to execute the xauth command with root privileges and make it read an arbitrary input file.
(CVE-2010-3316)

Solution

Update the affected pam and / or pam-devel packages.

See Also

http://www.nessus.org/u?6fb638b2

Plugin Details

Severity: Medium

ID: 60882

File Name: sl_20101101_pam_on_SL5_x.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2012/08/01

Updated: 2019/01/02

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2010/11/01

Reference Information

CVE: CVE-2010-3316, CVE-2010-3435, CVE-2010-3853