CVE-2009-0360
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
13/02/2009
Last modified:
09/04/2025
Description
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
Impact
Base Score 2.0
6.20
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:* | 3.12 (including) | |
| cpe:2.3:a:eyrie:pam-krb5:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/33914
- http://secunia.com/advisories/33917
- http://secunia.com/advisories/34260
- http://secunia.com/advisories/34449
- http://security.gentoo.org/glsa/glsa-200903-39.xml
- http://securitytracker.com/id?1021711=
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1
- http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm
- http://www.debian.org/security/2009/dsa-1721
- http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html
- http://www.securityfocus.com/archive/1/500892/100/0/threaded
- http://www.securityfocus.com/bid/33740
- http://www.ubuntu.com/usn/USN-719-1
- http://www.vupen.com/english/advisories/2009/0410
- http://www.vupen.com/english/advisories/2009/0426
- http://www.vupen.com/english/advisories/2009/0979
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732
- http://secunia.com/advisories/33914
- http://secunia.com/advisories/33917
- http://secunia.com/advisories/34260
- http://secunia.com/advisories/34449
- http://security.gentoo.org/glsa/glsa-200903-39.xml
- http://securitytracker.com/id?1021711=
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1
- http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm
- http://www.debian.org/security/2009/dsa-1721
- http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html
- http://www.securityfocus.com/archive/1/500892/100/0/threaded
- http://www.securityfocus.com/bid/33740
- http://www.ubuntu.com/usn/USN-719-1
- http://www.vupen.com/english/advisories/2009/0410
- http://www.vupen.com/english/advisories/2009/0426
- http://www.vupen.com/english/advisories/2009/0979
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732



