4.6
CVSSv2

CVE-2009-0361

Published: 13/02/2009 Updated: 11/10/2018
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Russ Allbery pam-krb5 prior to 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.

Vulnerable Product Search on Vulmon Subscribe to Product

eyrie pam-krb5 3.2

eyrie pam-krb5 3.3

eyrie pam-krb5

eyrie pam-krb5 3.0

eyrie pam-krb5 3.1

eyrie pam-krb5 3.6

eyrie pam-krb5 3.7

eyrie pam-krb5 3.10

eyrie pam-krb5 3.11

eyrie pam-krb5 3.8

eyrie pam-krb5 3.9

eyrie pam-krb5 3.4

eyrie pam-krb5 3.5

Vendor Advisories

Debian Bug report logs - #516695 libpam-heimdal: new version (313) fixing two security issues Package: libpam-heimdal; Maintainer for libpam-heimdal is Russ Allbery <rra@debianorg>; Source for libpam-heimdal is src:libpam-krb5 (PTS, buildd, popcon) Reported by: Richard A Nelson <cowboy@debianorg> Date: Mon, 23 Feb ...
It was discovered that pam_krb5 parsed environment variables when run with setuid applications A local attacker could exploit this flaw to bypass authentication checks and gain root privileges (CVE-2009-0360) ...
Several local vulnerabilities have been discovered in the PAM module for MIT Kerberos The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-0360 Russ Allbery discovered that the Kerberos PAM module parsed configuration settings from environment variables when run from a setuid context This could le ...