8.7 High
AI Score
Confidence
High
6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
0.4%
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
secunia.com/advisories/33914
secunia.com/advisories/33917
secunia.com/advisories/34260
secunia.com/advisories/34449
security.gentoo.org/glsa/glsa-200903-39.xml
securitytracker.com/id?1021711
sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1
support.avaya.com/elmodocs2/security/ASA-2009-070.htm
www.debian.org/security/2009/dsa-1721
www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html
www.securityfocus.com/archive/1/500892/100/0/threaded
www.securityfocus.com/bid/33740
www.ubuntu.com/usn/USN-719-1
www.vupen.com/english/advisories/2009/0410
www.vupen.com/english/advisories/2009/0426
www.vupen.com/english/advisories/2009/0979
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732