Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2009-0361

Overview

Vulnerability Score 4.6 4.6
CVE Id CVE-2009-0361
Last Modified 07 Mar 2011 10:18:22
Published 13 Feb 2009 12:30:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2009-0361

Summary

Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.

Vulnerable Systems

Application

  • Eyrie Pam-krb5 3.0

  • Eyrie Pam-krb5 3.1

  • Eyrie Pam-krb5 3.10

  • Eyrie Pam-krb5 3.11

  • Eyrie Pam-krb5 3.12

  • Eyrie Pam-krb5 3.2

  • Eyrie Pam-krb5 3.3

  • Eyrie Pam-krb5 3.4

  • Eyrie Pam-krb5 3.5

  • Eyrie Pam-krb5 3.6

  • Eyrie Pam-krb5 3.7

  • Eyrie Pam-krb5 3.8

  • Eyrie Pam-krb5 3.9


References

VUPEN - ADV-2009-0979

VUPEN - ADV-2009-0426

VUPEN - ADV-2009-0410

UBUNTU - USN-719-1

BID - 33741

BUGTRAQ - 20090211 pam-krb5 security advisory (3.12 and earlier)

MISC - http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html

DEBIAN - DSA-1722

DEBIAN - DSA-1721

CONFIRM - http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm

SUNALERT - 252767

SECTRACK - 1021711

GENTOO - GLSA-200903-39

SECUNIA - 34449

SECUNIA - 34260

SECUNIA - 33918

SECUNIA - 33917

SECUNIA - 33914


Last Updated: 27 May 2016 10:50:12