Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:017-1: pam


Vulnerability Assessment Details

MDKSA-2003:017-1: pam

Vulnerability Assessment Summary
Check for the version of the pam package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:017-1 (pam).


Andreas Beck discovered that the pam_xauth module would forward authorization
information from the root account to unprivileged users. This can be exploited
by a local attacker to gain access to the root user's X session. In order for it
to be successfully exploited, the attacker would have to somehow get the root
user to su to the account belonging to the attacker.
Update:
The previous fix was incorrect because certain applications, such as userdrake
and net_monitor could not be executed as root, although they could be executed
as users who successfully authenticated as root.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:017-1
Network Security Threat Level: High

Networks Security ID: 6753

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Asus 11.6" UX21E Genuine Laptop 128GB SSD Solid State Drive XM11 GLP*
$67.99
Asus 11.6Dell 600GB 2.5'' SFF SAS 6G 15K Hard Drive 1MJ200-150 ST600MP0005 0V5300 V5300
$168.41
Dell 600GB 2.5'' SFF SAS 6G 15K Hard Drive 1MJ200-150 ST600MP0005 0V5300 V5300 pictureSeagate 2TB FireCuda Gaming SSHD 7200 RPM SATA 6Gb/s 64MB Cache
$85.95
Seagate 2TB FireCuda Gaming SSHD 7200 RPM SATA 6Gb/s 64MB Cache picture


Discussions

No Discussions have been posted on this vulnerability.