CVE Vulnerabilities

CVE-2009-0361

Published: Feb 13, 2009 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.

Affected Software

NameVendorStart VersionEnd Version
Pam-krb5Eyrie*3.12 (including)
Pam-krb5Eyrie3.0 (including)3.0 (including)
Pam-krb5Eyrie3.1 (including)3.1 (including)
Pam-krb5Eyrie3.2 (including)3.2 (including)
Pam-krb5Eyrie3.3 (including)3.3 (including)
Pam-krb5Eyrie3.4 (including)3.4 (including)
Pam-krb5Eyrie3.5 (including)3.5 (including)
Pam-krb5Eyrie3.6 (including)3.6 (including)
Pam-krb5Eyrie3.7 (including)3.7 (including)
Pam-krb5Eyrie3.8 (including)3.8 (including)
Pam-krb5Eyrie3.9 (including)3.9 (including)
Pam-krb5Eyrie3.10 (including)3.10 (including)
Pam-krb5Eyrie3.11 (including)3.11 (including)
Libpam-heimdalUbuntudapper*
Libpam-heimdalUbuntugutsy*
Libpam-heimdalUbuntuhardy*
Libpam-heimdalUbuntuintrepid*
Libpam-heimdalUbuntuupstream*
Libpam-krb5Ubuntudapper*
Libpam-krb5Ubuntudevel*
Libpam-krb5Ubuntugutsy*
Libpam-krb5Ubuntuhardy*
Libpam-krb5Ubuntuintrepid*
Libpam-krb5Ubuntujaunty*
Libpam-krb5Ubuntukarmic*
Libpam-krb5Ubuntulucid*
Libpam-krb5Ubuntumaverick*
Libpam-krb5Ubuntunatty*
Libpam-krb5Ubuntuoneiric*
Libpam-krb5Ubuntuupstream*

References