Vulnerability CVE-2011-5054


Published: 2012-01-06   Modified: 2012-02-13

Description:
kcheckpass passes a user-supplied argument to the pam_start function, often within a setuid environment, which allows local users to invoke any configured PAM stack, and possibly trigger unintended side effects, via an arbitrary valid PAM service name, a different vulnerability than CVE-2011-4122. NOTE: the vendor indicates that the possibility of resultant privilege escalation may be "a bit far-fetched."

Type:

CWE-287

(Improper Authentication)

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
KDE -> Kcheckpass 

 References:
http://xforce.iss.net/xforce/xfdb/72230
http://openwall.com/lists/oss-security/2012/01/02/11
http://openwall.com/lists/oss-security/2012/01/02/10
http://openwall.com/lists/oss-security/2011/12/28/5
http://openwall.com/lists/oss-security/2011/12/27/3
http://openwall.com/lists/oss-security/2011/12/27/1
http://openwall.com/lists/oss-security/2011/12/23/8
http://openwall.com/lists/oss-security/2011/12/08/9
http://openwall.com/lists/oss-security/2011/12/07/3
http://c-skills.blogspot.com/2011/11/openpam-trickery.html

Copyright 2024, cxsecurity.com

 

Back to Top