Rapid7 Vulnerability & Exploit Database

USN-719-1: pam-krb5 vulnerabilities

Back to Search

USN-719-1: pam-krb5 vulnerabilities

Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:C)
Published
02/13/2009
Created
07/25/2018
Added
05/06/2013
Modified
07/09/2020

Description

Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.

Solution(s)

  • ubuntu-upgrade-libpam-krb5

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;