gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2011/05/31/11 | mailing list patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67720 | vdb entry |
http://www.securityfocus.com/bid/48035 | vdb entry |
https://bugzilla.novell.com/show_bug.cgi?id=695627 | patch |
http://openwall.com/lists/oss-security/2011/05/30/2 | mailing list patch |