{ "schema_version": "1.4.0", "id": "GHSA-w277-x5vx-mcc9", "modified": "2022-04-30T18:20:39Z", "published": "2022-04-30T18:20:39Z", "aliases": [ "CVE-2002-1160" ], "details": "The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1160" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000693" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=104431622818954&w=2" }, { "type": "WEB", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55760" }, { "type": "WEB", "url": "http://www.iss.net/security_center/static/11254.php" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/911505" }, { "type": "WEB", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:017" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2003-028.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2003-035.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/6753" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2003-02-19T05:00:00Z" } }