Vulnerability Details : CVE-2009-0360
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
Vulnerability category: BypassGain privilege
Exploit prediction scoring system (EPSS) score for CVE-2009-0360
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-0360
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.2
|
MEDIUM | AV:L/AC:H/Au:N/C:C/I:C/A:C |
1.9
|
10.0
|
NIST |
CWE ids for CVE-2009-0360
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-0360
-
Red Hat 2009-02-13Not vulnerable. This issue did not affect the versions of the pam_krb5 package, as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
-
http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html
Vendor Advisory
- http://www.vupen.com/english/advisories/2009/0979
- http://www.vupen.com/english/advisories/2009/0426
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669
- http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm
- http://www.securityfocus.com/archive/1/500892/100/0/threaded
- http://www.ubuntu.com/usn/USN-719-1
-
http://www.securityfocus.com/bid/33740
- http://securitytracker.com/id?1021711
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1
- http://security.gentoo.org/glsa/glsa-200903-39.xml
- http://www.vupen.com/english/advisories/2009/0410
- http://www.debian.org/security/2009/dsa-1721
- cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.4:*:*:*:*:*:*:*