Vulnerability Description
sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mit | Kerberos 5 | - |
| Todd Miller | Sudo | 1.6.8_p12 |
References
- http://secunia.com/advisories/26540
- http://www.securityfocus.com/archive/1/470739/100/0/threaded
- http://www.securityfocus.com/archive/1/470752/100/0/threaded
- http://www.securityfocus.com/archive/1/470774/100/0/threaded
- http://www.securityfocus.com/bid/24368
- http://www.sudo.ws/cgi-bin/cvsweb/sudo/auth/kerb5.c
- http://secunia.com/advisories/26540
- http://www.securityfocus.com/archive/1/470739/100/0/threaded
- http://www.securityfocus.com/archive/1/470752/100/0/threaded
- http://www.securityfocus.com/archive/1/470774/100/0/threaded
- http://www.securityfocus.com/bid/24368
- http://www.sudo.ws/cgi-bin/cvsweb/sudo/auth/kerb5.c
FAQ
What is CVE-2007-3149?
CVE-2007-3149 is a vulnerability with a CVSS score of 7.2 (HIGH). sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the ...
How severe is CVE-2007-3149?
CVE-2007-3149 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3149?
Check the references section above for vendor advisories and patch information. Affected products include: Mit Kerberos 5, Todd Miller Sudo.