First published: Mon Jun 11 2007(Updated: )
sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Todd Miller Sudo | =1.6.8_p12 | |
Kerberos 5 (libkrb5) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3149 has been classified with a medium severity as it allows local users to gain elevated privileges unintentionally.
To fix CVE-2007-3149, ensure that you update sudo to a version later than 1.6.8_p12 that addresses this vulnerability.
CVE-2007-3149 affects systems using sudo version 1.6.8_p12 linked with MIT Kerberos 5.
The impact of CVE-2007-3149 is that it may allow local users to exploit certain environment variable settings to gain higher privileges.
CVE-2007-3149 is a local vulnerability that requires local user access to exploit.