Vulnerability Details : CVE-2009-0360
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
Vulnerability category: BypassGain privilege
Products affected by CVE-2009-0360
- cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:2.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-0360
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-0360
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.2
|
MEDIUM | AV:L/AC:H/Au:N/C:C/I:C/A:C |
1.9
|
10.0
|
NIST |
CWE ids for CVE-2009-0360
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-0360
-
Red Hat 2009-02-13Not vulnerable. This issue did not affect the versions of the pam_krb5 package, as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
References for CVE-2009-0360
-
http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html
pam-krb5 2009-02-11 AdvisoryVendor Advisory
-
http://www.vupen.com/english/advisories/2009/0979
Site en construction
-
http://www.vupen.com/english/advisories/2009/0426
Site en construction
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669
404 Not Found
-
http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm
ASA-2009-070 (SUN 252767)
-
http://www.securityfocus.com/archive/1/500892/100/0/threaded
-
http://www.ubuntu.com/usn/USN-719-1
500: Server error | Ubuntu
-
http://www.securityfocus.com/bid/33740
-
http://securitytracker.com/id?1021711
GoDaddy Domain Name Search
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732
404 Not Found
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1
-
http://security.gentoo.org/glsa/glsa-200903-39.xml
pam_krb5: Privilege escalation (GLSA 200903-39) — Gentoo security
-
http://www.vupen.com/english/advisories/2009/0410
Site en construction
-
http://www.debian.org/security/2009/dsa-1721
[SECURITY] [DSA 1721-1] New libpam-krb5 packages fix local privilege escalation
Jump to