Vulnerabilities > CVE-2002-1160 - Unspecified vulnerability in Redhat Linux
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN redhat
nessus
Summary
The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Nessus
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2003-017.NASL description Andreas Beck discovered that the pam_xauth module would forward authorization information from the root account to unprivileged users. This can be exploited by a local attacker to gain access to the root user last seen 2020-06-01 modified 2020-06-02 plugin id 14002 published 2004-07-31 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14002 title Mandrake Linux Security Advisory : pam (MDKSA-2003:017-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandrake Linux Security Advisory MDKSA-2003:017. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(14002); script_version ("1.18"); script_cvs_date("Date: 2019/08/02 13:32:46"); script_cve_id("CVE-2002-1160"); script_xref(name:"MDKSA", value:"2003:017-1"); script_name(english:"Mandrake Linux Security Advisory : pam (MDKSA-2003:017-1)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandrake Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Andreas Beck discovered that the pam_xauth module would forward authorization information from the root account to unprivileged users. This can be exploited by a local attacker to gain access to the root user's X session. In order for it to be successfully exploited, the attacker would have to somehow get the root user to su to the account belonging to the attacker. Update : The previous fix was incorrect because certain applications, such as userdrake and net_monitor could not be executed as root, although they could be executed as users who successfully authenticated as root." ); script_set_attribute( attribute:"solution", value:"Update the affected pam, pam-devel and / or pam-doc packages." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:pam"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:pam-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:pam-doc"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:8.2"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:9.0"); script_set_attribute(attribute:"patch_publication_date", value:"2003/04/28"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/31"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"pam-0.75-25.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"pam-devel-0.75-25.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"pam-doc-0.75-25.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"pam-0.75-25.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"pam-devel-0.75-25.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"pam-doc-0.75-25.2mdk", yank:"mdk")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2003-028.NASL description Updated PAM packages are now available. These packages correct a bug in pam_xauth last seen 2020-06-01 modified 2020-06-02 plugin id 12356 published 2004-07-06 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/12356 title RHEL 2.1 : pam (RHSA-2003:028)
Redhat
advisories |
|
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000693
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000693
- http://marc.info/?l=bugtraq&m=104431622818954&w=2
- http://marc.info/?l=bugtraq&m=104431622818954&w=2
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55760
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55760
- http://www.iss.net/security_center/static/11254.php
- http://www.iss.net/security_center/static/11254.php
- http://www.kb.cert.org/vuls/id/911505
- http://www.kb.cert.org/vuls/id/911505
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:017
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:017
- http://www.redhat.com/support/errata/RHSA-2003-028.html
- http://www.redhat.com/support/errata/RHSA-2003-028.html
- http://www.redhat.com/support/errata/RHSA-2003-035.html
- http://www.redhat.com/support/errata/RHSA-2003-035.html
- http://www.securityfocus.com/bid/6753
- http://www.securityfocus.com/bid/6753