Vulnerability Details : CVE-2009-0361
Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.
Products affected by CVE-2009-0361
- cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*
- cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-0361
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-0361
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
CWE ids for CVE-2009-0361
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-0361
-
Red Hat 2009-02-13Not vulnerable. This issue did not affect the versions of the pam_krb5 package, as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
References for CVE-2009-0361
-
http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html
pam-krb5 2009-02-11 Advisory
-
http://www.vupen.com/english/advisories/2009/0979
Site en construction
-
http://www.vupen.com/english/advisories/2009/0426
Site en construction
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5403
404 Not Found
-
http://www.securityfocus.com/bid/33741
-
http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm
ASA-2009-070 (SUN 252767)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5521
404 Not Found
-
http://www.securityfocus.com/archive/1/500892/100/0/threaded
-
http://www.ubuntu.com/usn/USN-719-1
500: Server error | Ubuntu
-
http://securitytracker.com/id?1021711
GoDaddy Domain Name Search
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1
-
http://www.debian.org/security/2009/dsa-1722
[SECURITY] [DSA 1722-1] New libpam-heimdal packages fix local privilege escalation
-
http://security.gentoo.org/glsa/glsa-200903-39.xml
pam_krb5: Privilege escalation (GLSA 200903-39) — Gentoo security
-
http://www.vupen.com/english/advisories/2009/0410
Site en construction
-
http://www.debian.org/security/2009/dsa-1721
[SECURITY] [DSA 1721-1] New libpam-krb5 packages fix local privilege escalation
Jump to