First published: Fri Feb 13 2009(Updated: )
Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eyrie Pam-krb5 | =3.1 | |
Eyrie Pam-krb5 | =3.4 | |
Eyrie Pam-krb5 | =3.5 | |
Eyrie Pam-krb5 | =3.6 | |
Eyrie Pam-krb5 | =3.7 | |
Eyrie Pam-krb5 | =3.10 | |
Eyrie Pam-krb5 | =3.11 | |
Eyrie Pam-krb5 | <=3.12 | |
Eyrie Pam-krb5 | =3.0 | |
Eyrie Pam-krb5 | =3.8 | |
Eyrie Pam-krb5 | =3.9 | |
Eyrie Pam-krb5 | =3.2 | |
Eyrie Pam-krb5 | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.