Search criteria

4 vulnerabilities by eyrie

CVE-2018-0493 (GCVE-0-2018-0493)

Vulnerability from cvelistv5 – Published: 2018-04-03 07:00 – Updated: 2024-08-05 03:28
VLAI?
Summary
remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
Severity ?
No CVSS data available.
CWE
  • Use after free, double free
Assigner
Impacted products
Vendor Product Version
n/a remctl Affected: remctl
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T03:28:10.664Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://git.eyrie.org/?p=kerberos/remctl.git%3Ba=commit%3Bh=86c7e44090c988112a37589d2c7a94029eb5e641"
          },
          {
            "name": "DSA-4159",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4159"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.eyrie.org/~eagle/software/remctl/security/2018-04-01.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "remctl",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "remctl"
            }
          ]
        }
      ],
      "datePublic": "2018-04-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Use after free, double free",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-03T09:57:01",
        "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
        "shortName": "debian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://git.eyrie.org/?p=kerberos/remctl.git%3Ba=commit%3Bh=86c7e44090c988112a37589d2c7a94029eb5e641"
        },
        {
          "name": "DSA-4159",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4159"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.eyrie.org/~eagle/software/remctl/security/2018-04-01.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@debian.org",
          "ID": "CVE-2018-0493",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "remctl",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "remctl"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Use after free, double free"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://git.eyrie.org/?p=kerberos/remctl.git;a=commit;h=86c7e44090c988112a37589d2c7a94029eb5e641",
              "refsource": "CONFIRM",
              "url": "https://git.eyrie.org/?p=kerberos/remctl.git;a=commit;h=86c7e44090c988112a37589d2c7a94029eb5e641"
            },
            {
              "name": "DSA-4159",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4159"
            },
            {
              "name": "https://www.eyrie.org/~eagle/software/remctl/security/2018-04-01.html",
              "refsource": "CONFIRM",
              "url": "https://www.eyrie.org/~eagle/software/remctl/security/2018-04-01.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
    "assignerShortName": "debian",
    "cveId": "CVE-2018-0493",
    "datePublished": "2018-04-03T07:00:00",
    "dateReserved": "2017-11-27T00:00:00",
    "dateUpdated": "2024-08-05T03:28:10.664Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1384 (GCVE-0-2009-1384)

Vulnerability from cvelistv5 – Published: 2009-05-28 20:14 – Updated: 2024-08-07 05:13
VLAI?
Summary
pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/35230 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
https://bugzilla.redhat.com/show_bug.cgi?id=502602 x_refsource_CONFIRM
http://secunia.com/advisories/43314 third-party-advisoryx_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2009/05/27/1 mailing-listx_refsource_MLIST
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://osvdb.org/54791 vdb-entryx_refsource_OSVDB
http://www.vmware.com/security/advisories/VMSA-20… x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/516397/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2009/1448 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/35112 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.295Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35230",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35230"
          },
          {
            "name": "oval:org.mitre.oval:def:9652",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9652"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502602"
          },
          {
            "name": "43314",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43314"
          },
          {
            "name": "[oss-security] 20090527 CVE assignment notification (pam_krb5 CVE-2009-1384)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/05/27/1"
          },
          {
            "name": "oval:org.mitre.oval:def:7081",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7081"
          },
          {
            "name": "MDVSA-2010:054",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:054"
          },
          {
            "name": "54791",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54791"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
          },
          {
            "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
          },
          {
            "name": "ADV-2009-1448",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1448"
          },
          {
            "name": "35112",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35112"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "35230",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35230"
        },
        {
          "name": "oval:org.mitre.oval:def:9652",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9652"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502602"
        },
        {
          "name": "43314",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43314"
        },
        {
          "name": "[oss-security] 20090527 CVE assignment notification (pam_krb5 CVE-2009-1384)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/05/27/1"
        },
        {
          "name": "oval:org.mitre.oval:def:7081",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7081"
        },
        {
          "name": "MDVSA-2010:054",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:054"
        },
        {
          "name": "54791",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54791"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
        },
        {
          "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
        },
        {
          "name": "ADV-2009-1448",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1448"
        },
        {
          "name": "35112",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35112"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-1384",
    "datePublished": "2009-05-28T20:14:00",
    "dateReserved": "2009-04-23T00:00:00",
    "dateUpdated": "2024-08-07T05:13:25.295Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0360 (GCVE-0-2009-0360)

Vulnerability from cvelistv5 – Published: 2009-02-13 17:00 – Updated: 2024-08-07 04:31
VLAI?
Summary
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/34260 third-party-advisoryx_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://secunia.com/advisories/33914 third-party-advisoryx_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-719-1 vendor-advisoryx_refsource_UBUNTU
http://www.vupen.com/english/advisories/2009/0426 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1021711 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2009/0410 vdb-entryx_refsource_VUPEN
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://secunia.com/advisories/34449 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/33917 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1721 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/archive/1/500892/100… mailing-listx_refsource_BUGTRAQ
http://www.eyrie.org/~eagle/software/pam-krb5/sec… x_refsource_MISC
http://security.gentoo.org/glsa/glsa-200903-39.xml vendor-advisoryx_refsource_GENTOO
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/bid/33740 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2009/0979 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:31:25.684Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34260",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34260"
          },
          {
            "name": "252767",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1"
          },
          {
            "name": "oval:org.mitre.oval:def:5732",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732"
          },
          {
            "name": "33914",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33914"
          },
          {
            "name": "USN-719-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-719-1"
          },
          {
            "name": "ADV-2009-0426",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0426"
          },
          {
            "name": "1021711",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021711"
          },
          {
            "name": "ADV-2009-0410",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0410"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm"
          },
          {
            "name": "34449",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34449"
          },
          {
            "name": "33917",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33917"
          },
          {
            "name": "DSA-1721",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1721"
          },
          {
            "name": "20090211 pam-krb5 security advisory (3.12 and earlier)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html"
          },
          {
            "name": "GLSA-200903-39",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200903-39.xml"
          },
          {
            "name": "oval:org.mitre.oval:def:5669",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669"
          },
          {
            "name": "33740",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/33740"
          },
          {
            "name": "ADV-2009-0979",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0979"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34260",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34260"
        },
        {
          "name": "252767",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1"
        },
        {
          "name": "oval:org.mitre.oval:def:5732",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732"
        },
        {
          "name": "33914",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33914"
        },
        {
          "name": "USN-719-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-719-1"
        },
        {
          "name": "ADV-2009-0426",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0426"
        },
        {
          "name": "1021711",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021711"
        },
        {
          "name": "ADV-2009-0410",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0410"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm"
        },
        {
          "name": "34449",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34449"
        },
        {
          "name": "33917",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33917"
        },
        {
          "name": "DSA-1721",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1721"
        },
        {
          "name": "20090211 pam-krb5 security advisory (3.12 and earlier)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html"
        },
        {
          "name": "GLSA-200903-39",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200903-39.xml"
        },
        {
          "name": "oval:org.mitre.oval:def:5669",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669"
        },
        {
          "name": "33740",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/33740"
        },
        {
          "name": "ADV-2009-0979",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0979"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0360",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34260",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34260"
            },
            {
              "name": "252767",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1"
            },
            {
              "name": "oval:org.mitre.oval:def:5732",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732"
            },
            {
              "name": "33914",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33914"
            },
            {
              "name": "USN-719-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-719-1"
            },
            {
              "name": "ADV-2009-0426",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0426"
            },
            {
              "name": "1021711",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021711"
            },
            {
              "name": "ADV-2009-0410",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0410"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm"
            },
            {
              "name": "34449",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34449"
            },
            {
              "name": "33917",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33917"
            },
            {
              "name": "DSA-1721",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1721"
            },
            {
              "name": "20090211 pam-krb5 security advisory (3.12 and earlier)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded"
            },
            {
              "name": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html",
              "refsource": "MISC",
              "url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html"
            },
            {
              "name": "GLSA-200903-39",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200903-39.xml"
            },
            {
              "name": "oval:org.mitre.oval:def:5669",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669"
            },
            {
              "name": "33740",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/33740"
            },
            {
              "name": "ADV-2009-0979",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0979"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0360",
    "datePublished": "2009-02-13T17:00:00",
    "dateReserved": "2009-01-29T00:00:00",
    "dateUpdated": "2024-08-07T04:31:25.684Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0361 (GCVE-0-2009-0361)

Vulnerability from cvelistv5 – Published: 2009-02-13 17:00 – Updated: 2024-08-07 04:31
VLAI?
Summary
Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://secunia.com/advisories/34260 third-party-advisoryx_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/33914 third-party-advisoryx_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-719-1 vendor-advisoryx_refsource_UBUNTU
http://www.debian.org/security/2009/dsa-1722 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/33918 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/0426 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1021711 vdb-entryx_refsource_SECTRACK
http://www.vupen.com/english/advisories/2009/0410 vdb-entryx_refsource_VUPEN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://secunia.com/advisories/34449 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/33917 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1721 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/archive/1/500892/100… mailing-listx_refsource_BUGTRAQ
http://www.eyrie.org/~eagle/software/pam-krb5/sec… x_refsource_MISC
http://security.gentoo.org/glsa/glsa-200903-39.xml vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/33741 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2009/0979 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:31:26.245Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:5521",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5521"
          },
          {
            "name": "34260",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34260"
          },
          {
            "name": "252767",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1"
          },
          {
            "name": "33914",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33914"
          },
          {
            "name": "USN-719-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-719-1"
          },
          {
            "name": "DSA-1722",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1722"
          },
          {
            "name": "33918",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33918"
          },
          {
            "name": "ADV-2009-0426",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0426"
          },
          {
            "name": "1021711",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021711"
          },
          {
            "name": "ADV-2009-0410",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0410"
          },
          {
            "name": "oval:org.mitre.oval:def:5403",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5403"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm"
          },
          {
            "name": "34449",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34449"
          },
          {
            "name": "33917",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33917"
          },
          {
            "name": "DSA-1721",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1721"
          },
          {
            "name": "20090211 pam-krb5 security advisory (3.12 and earlier)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html"
          },
          {
            "name": "GLSA-200903-39",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200903-39.xml"
          },
          {
            "name": "33741",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/33741"
          },
          {
            "name": "ADV-2009-0979",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0979"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:5521",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5521"
        },
        {
          "name": "34260",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34260"
        },
        {
          "name": "252767",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1"
        },
        {
          "name": "33914",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33914"
        },
        {
          "name": "USN-719-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-719-1"
        },
        {
          "name": "DSA-1722",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1722"
        },
        {
          "name": "33918",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33918"
        },
        {
          "name": "ADV-2009-0426",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0426"
        },
        {
          "name": "1021711",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021711"
        },
        {
          "name": "ADV-2009-0410",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0410"
        },
        {
          "name": "oval:org.mitre.oval:def:5403",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5403"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm"
        },
        {
          "name": "34449",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34449"
        },
        {
          "name": "33917",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33917"
        },
        {
          "name": "DSA-1721",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1721"
        },
        {
          "name": "20090211 pam-krb5 security advisory (3.12 and earlier)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html"
        },
        {
          "name": "GLSA-200903-39",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200903-39.xml"
        },
        {
          "name": "33741",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/33741"
        },
        {
          "name": "ADV-2009-0979",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0979"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0361",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:5521",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5521"
            },
            {
              "name": "34260",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34260"
            },
            {
              "name": "252767",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1"
            },
            {
              "name": "33914",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33914"
            },
            {
              "name": "USN-719-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-719-1"
            },
            {
              "name": "DSA-1722",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1722"
            },
            {
              "name": "33918",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33918"
            },
            {
              "name": "ADV-2009-0426",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0426"
            },
            {
              "name": "1021711",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021711"
            },
            {
              "name": "ADV-2009-0410",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0410"
            },
            {
              "name": "oval:org.mitre.oval:def:5403",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5403"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm"
            },
            {
              "name": "34449",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34449"
            },
            {
              "name": "33917",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33917"
            },
            {
              "name": "DSA-1721",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1721"
            },
            {
              "name": "20090211 pam-krb5 security advisory (3.12 and earlier)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded"
            },
            {
              "name": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html",
              "refsource": "MISC",
              "url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html"
            },
            {
              "name": "GLSA-200903-39",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200903-39.xml"
            },
            {
              "name": "33741",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/33741"
            },
            {
              "name": "ADV-2009-0979",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0979"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0361",
    "datePublished": "2009-02-13T17:00:00",
    "dateReserved": "2009-01-29T00:00:00",
    "dateUpdated": "2024-08-07T04:31:26.245Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}