### [CVE-2002-1160](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1160) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su. ### POC #### Reference - http://marc.info/?l=bugtraq&m=104431622818954&w=2 - http://www.kb.cert.org/vuls/id/911505 #### Github No PoCs found on GitHub currently.