Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-1721-1 New libpam-krb5 packages fix local privilege escalation
EUVD EUVD EUVD-2009-0364 Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
Ubuntu USN Ubuntu USN USN-719-1 pam-krb5 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T04:31:25.684Z

Reserved: 2009-01-29T00:00:00

Link: CVE-2009-0360

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2009-02-13T17:30:00.640

Modified: 2025-04-09T00:30:58.490

Link: CVE-2009-0360

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.