CVE-2009-0361

Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
VendorProductVersion
eyriepam-krb5
𝑥
≤ 3.12
eyriepam-krb5
3.0
eyriepam-krb5
3.1
eyriepam-krb5
3.2
eyriepam-krb5
3.3
eyriepam-krb5
3.4
eyriepam-krb5
3.5
eyriepam-krb5
3.6
eyriepam-krb5
3.7
eyriepam-krb5
3.8
eyriepam-krb5
3.9
eyriepam-krb5
3.10
eyriepam-krb5
3.11
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libpam-krb5
bullseye
4.9-2
fixed
bookworm
4.11-1
fixed
sid
4.11-2
fixed
trixie
4.11-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libpam-heimdal
oneiric
dne
natty
not-affected
maverick
not-affected
lucid
not-affected
karmic
not-affected
jaunty
not-affected
intrepid
ignored
hardy
ignored
gutsy
ignored
dapper
ignored
libpam-krb5
oneiric
Fixed 3.11-4ubuntu1
released
natty
Fixed 3.11-4ubuntu1
released
maverick
Fixed 3.11-4ubuntu1
released
lucid
Fixed 3.11-4ubuntu1
released
karmic
Fixed 3.11-4ubuntu1
released
jaunty
Fixed 3.11-4ubuntu1
released
intrepid
Fixed 3.10-1ubuntu0.8.10.1
released
hardy
Fixed 3.10-1ubuntu0.8.04.1
released
gutsy
ignored
dapper
ignored
Common Weakness Enumeration
References