Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-0832 | First vendor Publication | 2010-07-12 |
Vendor | Cve | Last vendor Modification | 2017-08-17 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.9 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
pam_motd (aka the MOTD module) in libpam-modules before 1.1.0-2ubuntu1.1 in PAM on Ubuntu 9.10 and libpam-modules before 1.1.1-2ubuntu5 in PAM on Ubuntu 10.04 LTS allows local users to change the ownership of arbitrary files via a symlink attack on .cache in a user's home directory, related to "user file stamps" and the motd.legal-notice file. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0832 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12944 | |||
Oval ID: | oval:org.mitre.oval:def:12944 | ||
Title: | USN-959-2 -- pam vulnerability | ||
Description: | USN-959-1 fixed vulnerabilities in PAM. This update provides the corresponding updates for Ubuntu 10.10. Original advisory details: Denis Excoffier discovered that the PAM MOTD module in Ubuntu did not correctly handle path permissions when creating user file stamps. A local attacker could exploit this to gain root privilieges. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-959-2 CVE-2010-0832 | Version: | 5 |
Platform(s): | Ubuntu 10.10 | Product(s): | pam |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13248 | |||
Oval ID: | oval:org.mitre.oval:def:13248 | ||
Title: | USN-959-1 -- pam vulnerability | ||
Description: | Denis Excoffier discovered that the PAM MOTD module in Ubuntu did not correctly handle path permissions when creating user file stamps. A local attacker could exploit this to gain root privilieges. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-959-1 CVE-2010-0832 | Version: | 5 |
Platform(s): | Ubuntu 9.10 Ubuntu 10.04 | Product(s): | pam |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 2 |
ExploitDB Exploits
id | Description |
---|---|
2010-07-12 | Ubuntu PAM MOTD Local Root Exploit |
2010-07-08 | Ubuntu PAM MOTD File Tampering (Privilege Escalation) |
OpenVAS Exploits
Date | Description |
---|---|
2010-11-23 | Name : Ubuntu Update for pam vulnerability USN-959-2 File : nvt/gb_ubuntu_USN_959_2.nasl |
2010-07-12 | Name : Ubuntu Update for pam vulnerability USN-959-1 File : nvt/gb_ubuntu_USN_959_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66116 | Ubuntu pam MOTD Module User File Stamps Symlink Privilege Escalation |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-26 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-959-2.nasl - Type : ACT_GATHER_INFO |
2010-07-08 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-959-1.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-04 12:11:12 |
|
2021-04-22 01:11:47 |
|
2020-05-23 00:25:23 |
|
2017-08-17 09:22:56 |
|
2016-06-28 18:04:21 |
|
2016-04-26 19:37:50 |
|
2014-02-17 10:54:13 |
|
2013-08-20 17:22:19 |
|
2013-08-15 21:19:46 |
|
2013-05-10 23:19:39 |
|