Lucene search

K
gentooGentoo FoundationGLSA-200903-39
HistoryMar 25, 2009 - 12:00 a.m.

pam_krb5: Privilege escalation

2009-03-2500:00:00
Gentoo Foundation
security.gentoo.org
16

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%

Background

pam_krb5 is a a Kerberos v5 PAM module.

Description

The following vulnerabilities were discovered:

  • pam_krb5 does not properly initialize the Kerberos libraries for setuid use (CVE-2009-0360).
  • Derek Chan reported that calls to pam_setcred() are not properly handled when running setuid (CVE-2009-0361).

Impact

A local attacker could set an environment variable to point to a specially crafted Kerberos configuration file and launch a PAM-based setuid application to elevate privileges, or change ownership and overwrite arbitrary files.

Workaround

There is no known workaround at this time.

Resolution

All pam_krb5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-auth/pam_krb5-3.12"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-auth/pam_krb5<Β 3.12UNKNOWN

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.3%