First published: Thu Jun 21 2012(Updated: )
libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Umich Libgssglue | <=0.3 | |
Umich Libgssglue | =0.1 | |
Umich Libgssglue | =0.2 | |
libgssapi-krb5 | =0.2 | |
libgssapi-krb5 | <=0.3 | |
libgssapi-krb5 | =0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2709 has a medium severity rating due to its potential to allow local users to execute arbitrary code.
To fix CVE-2011-2709, upgrade to libgssapi and libgssglue version 0.4 or later.
CVE-2011-2709 affects versions of libgssapi and libgssglue prior to 0.4.
CVE-2011-2709 enables local users to load untrusted configuration files which can lead to arbitrary code execution.
CVE-2011-2709 cannot be exploited remotely as it requires local user access to the affected system.