Vulnerability Description
Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eyrie | Pam-Krb5 | <= 3.12 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/33914Vendor Advisory
- http://secunia.com/advisories/33917Vendor Advisory
- http://secunia.com/advisories/33918Vendor Advisory
- http://secunia.com/advisories/34260
- http://secunia.com/advisories/34449
- http://security.gentoo.org/glsa/glsa-200903-39.xml
- http://securitytracker.com/id?1021711
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1
- http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm
- http://www.debian.org/security/2009/dsa-1721
- http://www.debian.org/security/2009/dsa-1722
- http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html
- http://www.securityfocus.com/archive/1/500892/100/0/threaded
- http://www.securityfocus.com/bid/33741
- http://www.ubuntu.com/usn/USN-719-1
FAQ
What is CVE-2009-0361?
CVE-2009-0361 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overw...
How severe is CVE-2009-0361?
CVE-2009-0361 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0361?
Check the references section above for vendor advisories and patch information. Affected products include: Eyrie Pam-Krb5.