Description
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1721-1 | New libpam-krb5 packages fix local privilege escalation |
EUVD |
EUVD-2009-0364 | Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application. |
Ubuntu USN |
USN-719-1 | pam-krb5 vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T04:31:25.684Z
Reserved: 2009-01-29T00:00:00.000Z
Link: CVE-2009-0360
No data.
Status : Modified
Published: 2009-02-13T17:30:00.640
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-0360
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN