Vulnerability CVE-2012-5536


Published: 2013-02-21   Modified: 2013-02-22

Description:
A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and Fedora Rawhide calls the glibc error function instead of the error function in the OpenSSH codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:L/AC:H/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.2/10
10/10
1.9/10
Exploit range
Attack complexity
Authentication
Local
High
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Redhat -> Enterprise linux 
Fedora project -> Fedora release rawhide 

 References:
http://pkgs.fedoraproject.org/cgit/openssh.git/commit/?id=4f4687ce8045418f678c323bb22c837f35d7b9fa
http://rhn.redhat.com/errata/RHSA-2013-0519.html
https://bugzilla.redhat.com/show_bug.cgi?id=834618

Copyright 2024, cxsecurity.com

 

Back to Top