CVE-2009-0361

EUVD-2009-0365
Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
Affected Products (NVD)
VendorProductVersion
eyriepam-krb5
𝑥
≤ 3.12
eyriepam-krb5
3.0
eyriepam-krb5
3.1
eyriepam-krb5
3.2
eyriepam-krb5
3.3
eyriepam-krb5
3.4
eyriepam-krb5
3.5
eyriepam-krb5
3.6
eyriepam-krb5
3.7
eyriepam-krb5
3.8
eyriepam-krb5
3.9
eyriepam-krb5
3.10
eyriepam-krb5
3.11
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libpam-krb5
bookworm
4.11-1
fixed
bullseye
4.9-2
fixed
sid
4.11-2
fixed
trixie
4.11-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libpam-heimdal
dapper
ignored
gutsy
ignored
hardy
ignored
intrepid
ignored
jaunty
not-affected
karmic
not-affected
lucid
not-affected
maverick
not-affected
natty
not-affected
oneiric
dne
libpam-krb5
dapper
ignored
gutsy
ignored
hardy
Fixed 3.10-1ubuntu0.8.04.1
released
intrepid
Fixed 3.10-1ubuntu0.8.10.1
released
jaunty
Fixed 3.11-4ubuntu1
released
karmic
Fixed 3.11-4ubuntu1
released
lucid
Fixed 3.11-4ubuntu1
released
maverick
Fixed 3.11-4ubuntu1
released
natty
Fixed 3.11-4ubuntu1
released
oneiric
Fixed 3.11-4ubuntu1
released
Common Weakness Enumeration
References