Privilege Escalation via Default Configuration of pam_xauth Module

Privilege Escalation via Default Configuration of pam_xauth Module

CVE-2002-1160 · HIGH Severity

AV:L/AC:L/AU:N/C:C/I:C/A:C

The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.

Learn more about our User Device Pen Test.