First published: Fri Feb 13 2009(Updated: )
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eyrie Pam-krb5 | =3.1 | |
Eyrie Pam-krb5 | =2.4 | |
Eyrie Pam-krb5 | =3.4 | |
Eyrie Pam-krb5 | =3.5 | |
Eyrie Pam-krb5 | =3.6 | |
Eyrie Pam-krb5 | =3.7 | |
Eyrie Pam-krb5 | =2.0 | |
Eyrie Pam-krb5 | =3.10 | |
Eyrie Pam-krb5 | =2.1 | |
Eyrie Pam-krb5 | =2.2 | |
Eyrie Pam-krb5 | =3.11 | |
Eyrie Pam-krb5 | <=3.12 | |
Eyrie Pam-krb5 | =3.0 | |
Eyrie Pam-krb5 | =3.8 | |
Eyrie Pam-krb5 | =3.9 | |
Eyrie Pam-krb5 | =2.6 | |
Eyrie Pam-krb5 | =2.3 | |
Eyrie Pam-krb5 | =2.5 | |
Eyrie Pam-krb5 | =3.2 | |
Eyrie Pam-krb5 | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.