CVE-2009-0360

Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.2 UNKNOWN
LOCAL
HIGH
AV:L/AC:H/Au:N/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 33%
VendorProductVersion
eyriepam-krb5
𝑥
≤ 3.12
eyriepam-krb5
2.0
eyriepam-krb5
2.1
eyriepam-krb5
2.2
eyriepam-krb5
2.3
eyriepam-krb5
2.4
eyriepam-krb5
2.5
eyriepam-krb5
2.6
eyriepam-krb5
3.0
eyriepam-krb5
3.1
eyriepam-krb5
3.2
eyriepam-krb5
3.3
eyriepam-krb5
3.4
eyriepam-krb5
3.5
eyriepam-krb5
3.6
eyriepam-krb5
3.7
eyriepam-krb5
3.8
eyriepam-krb5
3.9
eyriepam-krb5
3.10
eyriepam-krb5
3.11
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libpam-krb5
bullseye
4.9-2
fixed
bookworm
4.11-1
fixed
sid
4.11-2
fixed
trixie
4.11-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libpam-krb5
karmic
Fixed 3.11-4ubuntu1
released
jaunty
Fixed 3.11-4ubuntu1
released
intrepid
Fixed 3.10-1ubuntu0.8.10.1
released
hardy
Fixed 3.10-1ubuntu0.8.04.1
released
gutsy
ignored
dapper
ignored
References