![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2012-5536 |
Description: | A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and Fedora Rawhide calls the glibc error function instead of the error function in the OpenSSH codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.881646 1.3.6.1.4.1.25623.1.0.123714 1.3.6.1.4.1.25623.1.0.120388 1.3.6.1.4.1.25623.1.0.870927 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-5536 RHSA-2013:0519 http://rhn.redhat.com/errata/RHSA-2013-0519.html http://pkgs.fedoraproject.org/cgit/openssh.git/commit/?id=4f4687ce8045418f678c323bb22c837f35d7b9fa http://pkgs.fedoraproject.org/cgit/openssh.git/commit/?id=4f4687ce8045418f678c323bb22c837f35d7b9fa https://bugzilla.redhat.com/show_bug.cgi?id=834618 https://bugzilla.redhat.com/show_bug.cgi?id=834618 |