CVE-2006-3084

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.
References
Link Resource
ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt
http://fedoranews.org/cms/node/2376
http://secunia.com/advisories/21402 Vendor Advisory
http://secunia.com/advisories/21436 Vendor Advisory
http://secunia.com/advisories/21439 Vendor Advisory
http://secunia.com/advisories/21461 Vendor Advisory
http://secunia.com/advisories/21467 Vendor Advisory
http://secunia.com/advisories/21527 Vendor Advisory
http://secunia.com/advisories/21613 Vendor Advisory
http://secunia.com/advisories/23707 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200608-21.xml
http://securitytracker.com/id?1016664
http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt
http://www.debian.org/security/2006/dsa-1146
http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml
http://www.kb.cert.org/vuls/id/401660 US Government Resource
http://www.novell.com/linux/security/advisories/2006_20_sr.html
http://www.osvdb.org/27871
http://www.osvdb.org/27872
http://www.pdc.kth.se/heimdal/advisory/2006-08-08/
http://www.securityfocus.com/archive/1/442599/100/0/threaded
http://www.securityfocus.com/archive/1/443498/100/100/threaded
http://www.securityfocus.com/bid/19427
http://www.ubuntu.com/usn/usn-334-1
http://www.vupen.com/english/advisories/2006/3225 Vendor Advisory
ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt
http://fedoranews.org/cms/node/2376
http://secunia.com/advisories/21402 Vendor Advisory
http://secunia.com/advisories/21436 Vendor Advisory
http://secunia.com/advisories/21439 Vendor Advisory
http://secunia.com/advisories/21461 Vendor Advisory
http://secunia.com/advisories/21467 Vendor Advisory
http://secunia.com/advisories/21527 Vendor Advisory
http://secunia.com/advisories/21613 Vendor Advisory
http://secunia.com/advisories/23707 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200608-21.xml
http://securitytracker.com/id?1016664
http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt
http://www.debian.org/security/2006/dsa-1146
http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml
http://www.kb.cert.org/vuls/id/401660 US Government Resource
http://www.novell.com/linux/security/advisories/2006_20_sr.html
http://www.osvdb.org/27871
http://www.osvdb.org/27872
http://www.pdc.kth.se/heimdal/advisory/2006-08-08/
http://www.securityfocus.com/archive/1/442599/100/0/threaded
http://www.securityfocus.com/archive/1/443498/100/100/threaded
http://www.securityfocus.com/bid/19427
http://www.ubuntu.com/usn/usn-334-1
http://www.vupen.com/english/advisories/2006/3225 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:heimdal:heimdal:*:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt - () ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt -
References () http://fedoranews.org/cms/node/2376 - () http://fedoranews.org/cms/node/2376 -
References () http://secunia.com/advisories/21402 - Vendor Advisory () http://secunia.com/advisories/21402 - Vendor Advisory
References () http://secunia.com/advisories/21436 - Vendor Advisory () http://secunia.com/advisories/21436 - Vendor Advisory
References () http://secunia.com/advisories/21439 - Vendor Advisory () http://secunia.com/advisories/21439 - Vendor Advisory
References () http://secunia.com/advisories/21461 - Vendor Advisory () http://secunia.com/advisories/21461 - Vendor Advisory
References () http://secunia.com/advisories/21467 - Vendor Advisory () http://secunia.com/advisories/21467 - Vendor Advisory
References () http://secunia.com/advisories/21527 - Vendor Advisory () http://secunia.com/advisories/21527 - Vendor Advisory
References () http://secunia.com/advisories/21613 - Vendor Advisory () http://secunia.com/advisories/21613 - Vendor Advisory
References () http://secunia.com/advisories/23707 - Vendor Advisory () http://secunia.com/advisories/23707 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200608-21.xml - () http://security.gentoo.org/glsa/glsa-200608-21.xml -
References () http://securitytracker.com/id?1016664 - () http://securitytracker.com/id?1016664 -
References () http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt - () http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt -
References () http://www.debian.org/security/2006/dsa-1146 - () http://www.debian.org/security/2006/dsa-1146 -
References () http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml - () http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml -
References () http://www.kb.cert.org/vuls/id/401660 - US Government Resource () http://www.kb.cert.org/vuls/id/401660 - US Government Resource
References () http://www.novell.com/linux/security/advisories/2006_20_sr.html - () http://www.novell.com/linux/security/advisories/2006_20_sr.html -
References () http://www.osvdb.org/27871 - () http://www.osvdb.org/27871 -
References () http://www.osvdb.org/27872 - () http://www.osvdb.org/27872 -
References () http://www.pdc.kth.se/heimdal/advisory/2006-08-08/ - () http://www.pdc.kth.se/heimdal/advisory/2006-08-08/ -
References () http://www.securityfocus.com/archive/1/442599/100/0/threaded - () http://www.securityfocus.com/archive/1/442599/100/0/threaded -
References () http://www.securityfocus.com/archive/1/443498/100/100/threaded - () http://www.securityfocus.com/archive/1/443498/100/100/threaded -
References () http://www.securityfocus.com/bid/19427 - () http://www.securityfocus.com/bid/19427 -
References () http://www.ubuntu.com/usn/usn-334-1 - () http://www.ubuntu.com/usn/usn-334-1 -
References () http://www.vupen.com/english/advisories/2006/3225 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3225 - Vendor Advisory

Information

Published : 2006-08-09 10:04

Updated : 2024-11-21 00:12


NVD link : CVE-2006-3084

Mitre link : CVE-2006-3084

CVE.ORG link : CVE-2006-3084


JSON object : View

Products Affected

mit

  • kerberos_5

heimdal

  • heimdal
CWE
CWE-264

Permissions, Privileges, and Access Controls