[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98250

 
 

909

 
 

79281

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-5536

Date: (C)2013-02-22   (M)2016-05-19 


A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and Fedora Rawhide calls the glibc error function instead of the error function in the OpenSSH codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo.

CVSS Score: 6.2Access Vector: LOCAL
Exploit Score: 1.9Access Complexity: HIGH
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
RHSA-2013:0519
http://pkgs.fedoraproject.org/cgit/openssh.git/commit/?id=4f4687ce8045418f678c323bb22c837f35d7b9fa
https://bugzilla.redhat.com/show_bug.cgi?id=834618

CPE    1
cpe:/o:redhat:enterprise_linux:6
CWE    1
CWE-20
OVAL    4
oval:org.secpod.oval:def:202586
oval:org.secpod.oval:def:500986
oval:org.secpod.oval:def:1600205
oval:org.secpod.oval:def:1500018
...

© 2013 SecPod Technologies