Vulnerability Name: | CVE-2006-3083 (CCN-28378) | ||||||||||||||||||||
Assigned: | 2006-08-08 | ||||||||||||||||||||
Published: | 2006-08-08 | ||||||||||||||||||||
Updated: | 2020-01-21 | ||||||||||||||||||||
Summary: | The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion. | ||||||||||||||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: CONFIRM Type: UNKNOWN ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt Source: MITRE Type: CNA CVE-2006-3083 Source: CCN Type: RHSA-2006-0612 krb5 security update Source: CCN Type: SA21402 Kerberos V5 setuid Security Issue Source: SECUNIA Type: Vendor Advisory 21402 Source: SECUNIA Type: Vendor Advisory 21423 Source: CCN Type: SA21436 Heimdal setuid Security Issue Source: SECUNIA Type: Vendor Advisory 21436 Source: SECUNIA Type: Vendor Advisory 21439 Source: SECUNIA Type: Vendor Advisory 21441 Source: SECUNIA Type: Vendor Advisory 21456 Source: SECUNIA Type: Vendor Advisory 21461 Source: SECUNIA Type: Vendor Advisory 21467 Source: SECUNIA Type: Vendor Advisory 21527 Source: SECUNIA Type: Vendor Advisory 21613 Source: SECUNIA Type: Vendor Advisory 21847 Source: CCN Type: SA22291 Avaya Products Kerberos V5 setuid Security Issue Source: SECUNIA Type: Vendor Advisory 22291 Source: GENTOO Type: UNKNOWN GLSA-200608-21 Source: CCN Type: SECTRACK ID: 1016664 Kerberos Application Flaws in Evaluating setuid/seteuid Calls May Let Local Users Gain Elevated Privileges Source: SECTRACK Type: UNKNOWN 1016664 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2006-211.htm Source: CCN Type: ASA-2006-211 krb5 security update (RHSA-2006-0612) Source: CCN Type: MIT krb5 Security Advisory 2006-001 multiple local privilege escalation vulnerabilities Source: CONFIRM Type: Patch, Vendor Advisory http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt Source: CCN Type: Kerberos Web site Kerberos: The Network Authentication Protocol Source: DEBIAN Type: UNKNOWN DSA-1146 Source: DEBIAN Type: DSA-1146 krb5 -- programming error Source: CCN Type: GLSA-200608-15 MIT Kerberos 5: Multiple local privilege escalation vulnerabilities Source: GENTOO Type: UNKNOWN GLSA-200608-15 Source: CCN Type: GLSA-200608-21 Heimdal: Multiple local privilege escalation vulnerabilities Source: CCN Type: US-CERT VU#580124 MIT Kerberos (krb5) krshd and v4rcp do not properly validate setuid() or seteuid() calls Source: CERT-VN Type: Patch, US Government Resource VU#580124 Source: MANDRIVA Type: UNKNOWN MDKSA-2006:139 Source: SUSE Type: UNKNOWN SUSE-SR:2006:020 Source: SUSE Type: UNKNOWN SUSE-SR:2006:022 Source: OSVDB Type: UNKNOWN 27869 Source: OSVDB Type: UNKNOWN 27870 Source: CCN Type: OSVDB ID: 27869 MIT Kerberos 5 krshd setuid() Local Privilege Escalation Source: CCN Type: OSVDB ID: 27870 MIT Kerberos 5 v4rcp setuid() Local Privilege Escalation Source: CCN Type: Heimdal Security Advisory 2006-08-08: multiple local privilege escalation vulnerabilities Source: CONFIRM Type: UNKNOWN http://www.pdc.kth.se/heimdal/advisory/2006-08-08/ Source: REDHAT Type: Patch, Vendor Advisory RHSA-2006:0612 Source: BUGTRAQ Type: UNKNOWN 20060808 MITKRB-SA-2006-001: multiple local privilege escalation vulnerabilities Source: BUGTRAQ Type: UNKNOWN 20060816 UPDATED: MITKRB5-SA-2006-001: multiple local privilege escalation vulnerabilities Source: BID Type: UNKNOWN 19427 Source: CCN Type: BID-19427 MIT Kerberos 5 Multiple Local Privilege Escalation Vulnerabilities Source: CCN Type: USN-334-1 krb5 vulnerabilities Source: UBUNTU Type: UNKNOWN USN-334-1 Source: VUPEN Type: Vendor Advisory ADV-2006-3225 Source: XF Type: UNKNOWN kerberos-setuid-privilege-escalation(28378) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9515 Source: SUSE Type: SUSE-SR:2006:020 SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2006:022 SUSE Security Summary Report | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |