7.2
CVSSv2

CVE-2006-3084

Published: 09/08/2006 Updated: 21/01/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x prior to 1.4.4, and (b) Heimdal 0.7.2 and previous versions, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5 1.5

heimdal heimdal

mit kerberos 5 1.4

mit kerberos 5 1.4.1

mit kerberos 5 1.4.2

mit kerberos 5 1.4.3

Vendor Advisories

Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006 ...
Michael Calmer and Marcus Meissner discovered that several krb5 tools did not check the return values from setuid() system calls On systems that have configured user process limits, it may be possible for an attacker to cause setuid() to fail via resource starvation In that situation, the tools will not reduce their privilege levels, and will c ...