{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The check_acl function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) 1.1.2 and earlier does not verify that a certain ACL file is a regular file, which might allow local users to cause a denial of service (resource consumption) via a special file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "linuxpam-checkacl-dos(65036)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65036" }, { "name": "GLSA-201206-31", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201206-31.xml" }, { "name": "[oss-security] 20101004 Re: Minor security flaw with pam_xauth", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2010/10/03/1" }, { "name": "http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9", "refsource": "CONFIRM", "url": "http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=Linux-PAM-1_1_2-2-gffe7058c70253d574b1963c7c93002bd410fddc9" }, { "name": "46045", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46045" }, { "name": "49711", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49711" } ] } }