Description
A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and Fedora Rawhide calls the glibc error function instead of the error function in the OpenSSH codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo.
Published: 2013-02-22
Score: 6.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2012-5428 A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and Fedora Rawhide calls the glibc error function instead of the error function in the OpenSSH codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo.
History

No history.

Subscriptions

Fedora Project Fedora Release Rawhide
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T21:05:47.356Z

Reserved: 2012-10-24T00:00:00.000Z

Link: CVE-2012-5536

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-02-22T00:55:00.927

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-5536

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-02-21T00:00:00Z

Links: CVE-2012-5536 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses