HomeLinux-PamCVE-2010-3431

CVE-2010-3431

UNKNOWN
1.9CVSS
Published: 2011-01-24
Updated: 2025-04-11
AI Analysis

Description

The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.

CVSS Metrics

Vector
AV:L/AC:M/Au:N/C:P/I:N/A:N
Access Vector
local
Access Cmplx
medium
Auth
none
Confidentiality
partial
Integrity
none
Availability
none
Weaknesses
NVD-CWE-Other

Metadata

Primary Vendor
LINUX-PAM
Published
1/24/2011
Last Modified
4/11/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

linux-pam : linux-pam

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2010-3431 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com