Description
Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.
Published: 2009-02-13
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1721-1 New libpam-krb5 packages fix local privilege escalation
Debian DSA Debian DSA DSA-1722-1 New libpam-heimdal packages fix local privilege escalation
EUVD EUVD EUVD-2009-0365 Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.
Ubuntu USN Ubuntu USN USN-719-1 pam-krb5 vulnerabilities
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T04:31:26.245Z

Reserved: 2009-01-29T00:00:00.000Z

Link: CVE-2009-0361

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-02-13T17:30:00.687

Modified: 2026-04-23T00:35:47.467

Link: CVE-2009-0361

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses