CVE-2009-0361
13.02.2009, 17:30
Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.Enginsight
Vendor | Product | Version |
---|---|---|
eyrie | pam-krb5 | 𝑥 ≤ 3.12 |
eyrie | pam-krb5 | 3.0 |
eyrie | pam-krb5 | 3.1 |
eyrie | pam-krb5 | 3.2 |
eyrie | pam-krb5 | 3.3 |
eyrie | pam-krb5 | 3.4 |
eyrie | pam-krb5 | 3.5 |
eyrie | pam-krb5 | 3.6 |
eyrie | pam-krb5 | 3.7 |
eyrie | pam-krb5 | 3.8 |
eyrie | pam-krb5 | 3.9 |
eyrie | pam-krb5 | 3.10 |
eyrie | pam-krb5 | 3.11 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
libpam-heimdal |
| ||||||||||||||||||||
libpam-krb5 |
|
Common Weakness Enumeration
References