Executive Summary

Informations
Name CVE-2010-0832 First vendor Publication 2010-07-12
Vendor Cve Last vendor Modification 2017-08-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.9 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

pam_motd (aka the MOTD module) in libpam-modules before 1.1.0-2ubuntu1.1 in PAM on Ubuntu 9.10 and libpam-modules before 1.1.1-2ubuntu5 in PAM on Ubuntu 10.04 LTS allows local users to change the ownership of arbitrary files via a symlink attack on .cache in a user's home directory, related to "user file stamps" and the motd.legal-notice file.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0832

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-59 Improper Link Resolution Before File Access ('Link Following')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12944
 
Oval ID: oval:org.mitre.oval:def:12944
Title: USN-959-2 -- pam vulnerability
Description: USN-959-1 fixed vulnerabilities in PAM. This update provides the corresponding updates for Ubuntu 10.10. Original advisory details: Denis Excoffier discovered that the PAM MOTD module in Ubuntu did not correctly handle path permissions when creating user file stamps. A local attacker could exploit this to gain root privilieges.
Family: unix Class: patch
Reference(s): USN-959-2
CVE-2010-0832
Version: 5
Platform(s): Ubuntu 10.10
Product(s): pam
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13248
 
Oval ID: oval:org.mitre.oval:def:13248
Title: USN-959-1 -- pam vulnerability
Description: Denis Excoffier discovered that the PAM MOTD module in Ubuntu did not correctly handle path permissions when creating user file stamps. A local attacker could exploit this to gain root privilieges.
Family: unix Class: patch
Reference(s): USN-959-1
CVE-2010-0832
Version: 5
Platform(s): Ubuntu 9.10
Ubuntu 10.04
Product(s): pam
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 2

ExploitDB Exploits

id Description
2010-07-12 Ubuntu PAM MOTD Local Root Exploit
2010-07-08 Ubuntu PAM MOTD File Tampering (Privilege Escalation)

OpenVAS Exploits

Date Description
2010-11-23 Name : Ubuntu Update for pam vulnerability USN-959-2
File : nvt/gb_ubuntu_USN_959_2.nasl
2010-07-12 Name : Ubuntu Update for pam vulnerability USN-959-1
File : nvt/gb_ubuntu_USN_959_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
66116 Ubuntu pam MOTD Module User File Stamps Symlink Privilege Escalation

Nessus® Vulnerability Scanner

Date Description
2010-10-26 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-959-2.nasl - Type : ACT_GATHER_INFO
2010-07-08 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-959-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/41465
EXPLOIT-DB http://www.exploit-db.com/exploits/14273
MISC http://twitter.com/jonoberheide/statuses/18009527979
http://www.h-online.com/security/news/item/Ubuntu-closes-root-hole-1034618.html
OSVDB http://www.osvdb.org/66116
SECUNIA http://secunia.com/advisories/40512
UBUNTU http://www.ubuntu.com/usn/USN-959-1
VUPEN http://www.vupen.com/english/advisories/2010/1747
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/60194

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2021-05-04 12:11:12
  • Multiple Updates
2021-04-22 01:11:47
  • Multiple Updates
2020-05-23 00:25:23
  • Multiple Updates
2017-08-17 09:22:56
  • Multiple Updates
2016-06-28 18:04:21
  • Multiple Updates
2016-04-26 19:37:50
  • Multiple Updates
2014-02-17 10:54:13
  • Multiple Updates
2013-08-20 17:22:19
  • Multiple Updates
2013-08-15 21:19:46
  • Multiple Updates
2013-05-10 23:19:39
  • Multiple Updates