Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.04 LTS, when using certain configurations such as "session optional pam_motd.so", allows local users to gain privileges by modifying the PATH environment variable to reference a malicious command, as demonstrated via uname.
References
Link | Resource |
---|---|
http://www.ubuntu.com/usn/USN-1237-1 | Vendor Advisory |
https://bugs.launchpad.net/ubuntu/%2Bsource/pam/%2Bbug/610125 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2014-04-15T18:00:00
Updated: 2014-04-15T17:57:01
Reserved: 2011-09-21T00:00:00
Link: CVE-2011-3628
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-04-15T23:55:07.297
Modified: 2014-04-16T15:04:35.687
Link: CVE-2011-3628
JSON object: View
Redhat Information
No data.
CWE