Lucene search

K
ubuntuUbuntuUSN-719-1
HistoryFeb 12, 2009 - 12:00 a.m.

pam-krb5 vulnerabilities

2009-02-1200:00:00
ubuntu.com
47

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

AI Score

9.5

Confidence

High

EPSS

0

Percentile

10.1%

Releases

  • Ubuntu 8.10
  • Ubuntu 8.04

Packages

  • libpam-krb5 -

Details

It was discovered that pam_krb5 parsed environment variables when run with
setuid applications. A local attacker could exploit this flaw to bypass
authentication checks and gain root privileges. (CVE-2009-0360)

Derek Chan discovered that pam_krb5 incorrectly handled refreshing existing
credentials when used with setuid applications. A local attacker could exploit
this to create or overwrite arbitrary files, and possibly gain root privileges.
(CVE-2009-0361)

OSVersionArchitecturePackageVersionFilename
Ubuntu8.10noarchlibpam-krb5<Β 3.10-1ubuntu0.8.10.1UNKNOWN
Ubuntu8.04noarchlibpam-krb5<Β 3.10-1ubuntu0.8.04.1UNKNOWN

CVSS2

6.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

AI Score

9.5

Confidence

High

EPSS

0

Percentile

10.1%