Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасностив pam_kerberos
Опубликовано:12 февраля 2009 г.
Источник:
SecurityVulns ID:9674
Тип:локальная
Уровень опасности:
5/10
Описание:Повышение привилегий, DoS.
CVE:CVE-2009-0361 (Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.)
 CVE-2009-0360 (Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.)
Оригинальный текстdocumentDEBIAN, [SECURITY] [DSA 1722-1] New libpam-heimdal packages fix local privilege escalation (12.02.2009)
 documentRuss Allbery, pam-krb5 security advisory (3.12 and earlier) (12.02.2009)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород