search menu icon-carat-right cmu-wordmark

CERT Coordination Center

pam_xauth may insecurely forward "X MIT-Magic-Cookies" to new sessions

Vulnerability Note VU#911505

Original Release Date: 2003-05-04 | Last Revised: 2003-06-17

Overview

A vulnerability exists in pam_xauth that may allow a local attacker to gain access to an administrator's X session.

Description

pam_xauth is used to forward xauth keys (or cookies) between users. From the pam_xauth man page:

Without pam_xauth, when xauth is enabled and a user uses the su command to
assume superuser priviledges, that user is not able to run X commands as
root without somehow giving root access to the xauth key used for the
current X session. pam_xauth solves the problem by forwarding the key from
the user running su (the source user) to the user whose identity the source
user is assuming (the target user) when the session is created, and
destroying the key when the session is torn down.

If a local attacker can cause the system administrator to su to the attacker's account, the attacker may be able to gain access to an administrator's X session. For further technical details, please see Andreas Beck's advisory.

Impact

A local attacker may be able to gain access to an administrator's X session.

Solution

Apply a patch from your vendor.

Vendor Information

911505
 

View all 57 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Andreas Beck.

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-1160
Severity Metric: 12.94
Date Public: 2003-02-03
Date First Published: 2003-05-04
Date Last Updated: 2003-06-17 16:41 UTC
Document Revision: 12

Sponsored by CISA.