CVE-2006-0582

Unspecified vulnerability in rshd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2, when storing forwarded credentials, allows attackers to overwrite arbitrary files and change file ownership via unknown vectors.
References
Link Resource
http://secunia.com/advisories/18733 Patch Vendor Advisory
http://secunia.com/advisories/18806 Patch Vendor Advisory
http://secunia.com/advisories/18894 Patch Vendor Advisory
http://secunia.com/advisories/19005 Patch Vendor Advisory
http://secunia.com/advisories/19302 Patch Vendor Advisory
http://securitytracker.com/id?1015591
http://www.debian.org/security/2006/dsa-977 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200603-14.xml Patch Vendor Advisory
http://www.osvdb.org/22986
http://www.pdc.kth.se/heimdal/advisory/2006-02-06/ Patch
http://www.securityfocus.com/archive/1/426043/100/0/threaded
http://www.securityfocus.com/bid/16524 Patch
http://www.stacken.kth.se/lists/heimdal-discuss/2006-02/msg00028.html
http://www.ubuntu.com/usn/usn-253-1
http://www.vupen.com/english/advisories/2006/0456 Vendor Advisory
http://www.vupen.com/english/advisories/2006/0628 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24532
https://usn.ubuntu.com/247-1/
http://secunia.com/advisories/18733 Patch Vendor Advisory
http://secunia.com/advisories/18806 Patch Vendor Advisory
http://secunia.com/advisories/18894 Patch Vendor Advisory
http://secunia.com/advisories/19005 Patch Vendor Advisory
http://secunia.com/advisories/19302 Patch Vendor Advisory
http://securitytracker.com/id?1015591
http://www.debian.org/security/2006/dsa-977 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200603-14.xml Patch Vendor Advisory
http://www.osvdb.org/22986
http://www.pdc.kth.se/heimdal/advisory/2006-02-06/ Patch
http://www.securityfocus.com/archive/1/426043/100/0/threaded
http://www.securityfocus.com/bid/16524 Patch
http://www.stacken.kth.se/lists/heimdal-discuss/2006-02/msg00028.html
http://www.ubuntu.com/usn/usn-253-1
http://www.vupen.com/english/advisories/2006/0456 Vendor Advisory
http://www.vupen.com/english/advisories/2006/0628 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24532
https://usn.ubuntu.com/247-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kth:heimdal:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:kth:heimdal:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:kth:heimdal:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:kth:heimdal:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:kth:heimdal:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:kth:heimdal:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:kth:heimdal:0.7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:kth:heimdal:0.7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:kth:heimdal:0.7.1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:06

Type Values Removed Values Added
References () http://secunia.com/advisories/18733 - Patch, Vendor Advisory () http://secunia.com/advisories/18733 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18806 - Patch, Vendor Advisory () http://secunia.com/advisories/18806 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18894 - Patch, Vendor Advisory () http://secunia.com/advisories/18894 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19005 - Patch, Vendor Advisory () http://secunia.com/advisories/19005 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19302 - Patch, Vendor Advisory () http://secunia.com/advisories/19302 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1015591 - () http://securitytracker.com/id?1015591 -
References () http://www.debian.org/security/2006/dsa-977 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-977 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200603-14.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200603-14.xml - Patch, Vendor Advisory
References () http://www.osvdb.org/22986 - () http://www.osvdb.org/22986 -
References () http://www.pdc.kth.se/heimdal/advisory/2006-02-06/ - Patch () http://www.pdc.kth.se/heimdal/advisory/2006-02-06/ - Patch
References () http://www.securityfocus.com/archive/1/426043/100/0/threaded - () http://www.securityfocus.com/archive/1/426043/100/0/threaded -
References () http://www.securityfocus.com/bid/16524 - Patch () http://www.securityfocus.com/bid/16524 - Patch
References () http://www.stacken.kth.se/lists/heimdal-discuss/2006-02/msg00028.html - () http://www.stacken.kth.se/lists/heimdal-discuss/2006-02/msg00028.html -
References () http://www.ubuntu.com/usn/usn-253-1 - () http://www.ubuntu.com/usn/usn-253-1 -
References () http://www.vupen.com/english/advisories/2006/0456 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0456 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/0628 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0628 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24532 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24532 -
References () https://usn.ubuntu.com/247-1/ - () https://usn.ubuntu.com/247-1/ -

Information

Published : 2006-02-08 01:02

Updated : 2024-11-21 00:06


NVD link : CVE-2006-0582

Mitre link : CVE-2006-0582

CVE.ORG link : CVE-2006-0582


JSON object : View

Products Affected

kth

  • heimdal