PAM pam_xauth模块未计划X会话cookie访问漏洞

漏洞信息详情

PAM pam_xauth模块未计划X会话cookie访问漏洞

漏洞简介

Pam_xauth模块的默认设置将MIT-Magic-Cookies转送到新X会话,本地用户可以利用该漏洞,通过从临时.xauth文件窃取cookie获取根权限,该文件在根使用su创建后具有原始用户的证书。

漏洞公告

Mandrake has released a security advisory (MDKSA-2003:017) containing fixes to address this issue.
Red Hat has released security advisory (RHSA-2003:035-10) containing fixes to address this issue. Users are advised to upgrade as soon as possible.
Red Hat has also released a security advisory (RHSA-2003:028-12) to address this issue in Enterprise Linux. Fixes have been made available via the Red Hat Network (RHN). Further information can be found in the attached advisory.
Conectiva has released updates to correct this issue. See the referenced advisory for more details.
Sun has released a fix for Sun Linux 5.0.6.
Fixes available:
pam_xauth pam_xauth 0.74

pam_xauth pam_xauth 0.75

参考网址

来源:US-CERT Vulnerability Note: VU#911505
名称: VU#911505
链接:http://www.kb.cert.org/vuls/id/911505

来源: BUGTRAQ
名称: 20021214 BDT_AV200212140001: Insecure default: Using pam_xauth for su from sh-utils package
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104431622818954&w=2

来源: XF
名称: linux-pamxauth-gain-privileges(11254)
链接:http://www.iss.net/security_center/static/11254.php

来源: BID
名称: 6753
链接:http://www.securityfocus.com/bid/6753

来源: REDHAT
名称: RHSA-2003:035
链接:http://www.redhat.com/support/errata/RHSA-2003-035.html

来源: REDHAT
名称: RHSA-2003:028
链接:http://www.redhat.com/support/errata/RHSA-2003-028.html

来源: MANDRAKE
名称: MDKSA-2003:017
链接:http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:017

来源: SUNALERT
名称: 55760
链接:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55760

来源: CONECTIVA
名称: CLA-2003:693
链接:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000693

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享