PAM MOTD module motd.legal-notice privilege escalation
|pammotd-motdlegalnotice-priv-escalation (60194)||High Risk|
The Ubuntu PAM MOTD module could allow a local attacker to gain elevated privileges on the system, caused by improper restrictions on the motd.legal-notice file within the cache directory. A local attacker could exploit this vulnerability using the motd=/path/filename parameter to gain root privileges on the system.
Apply the appropriate update for your system. See References.
- Offensive Security Exploit Database [07-08-2010]: Ubuntu PAM MOTD File Tampering (Privilege Escalation).
- Offensive Security Exploit Database [07-12-2010]: Ubuntu PAM MOTD Local Root Exploit.
- Ubuntu Web site: PAM MOTD.
- BID-41465: PAM MOTD Module Local Privilege Escalation Vulnerability
- CVE-2010-0832: pam_motd (aka the MOTD module) in libpam-modules before 1.1.0-2ubuntu1.1 in PAM on Ubuntu 9.10 and libpam-modules before 1.1.1-2ubuntu5 in PAM on Ubuntu 10.04 LTS allows local users to change the ownership of arbitrary files via a symlink attack on .cache in a user's home directory, related to user file stamps and the motd.legal-notice file.
- OSVDB ID: 66116: Ubuntu pam MOTD Module User File Stamps Symlink Privilege Escalation
- Canonical Ubuntu 10.04
- Canonical Ubuntu 9.10
Jul 08, 2010
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.