Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1721-1 | New libpam-krb5 packages fix local privilege escalation |
EUVD |
EUVD-2009-0364 | Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application. |
Ubuntu USN |
USN-719-1 | pam-krb5 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T04:31:25.684Z
Reserved: 2009-01-29T00:00:00
Link: CVE-2009-0360
No data.
Status : Deferred
Published: 2009-02-13T17:30:00.640
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-0360
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN