The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:12
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt - | |
References | () http://secunia.com/advisories/21402 - Vendor Advisory | |
References | () http://secunia.com/advisories/21423 - Vendor Advisory | |
References | () http://secunia.com/advisories/21436 - Vendor Advisory | |
References | () http://secunia.com/advisories/21439 - Vendor Advisory | |
References | () http://secunia.com/advisories/21441 - Vendor Advisory | |
References | () http://secunia.com/advisories/21456 - Vendor Advisory | |
References | () http://secunia.com/advisories/21461 - Vendor Advisory | |
References | () http://secunia.com/advisories/21467 - Vendor Advisory | |
References | () http://secunia.com/advisories/21527 - Vendor Advisory | |
References | () http://secunia.com/advisories/21613 - Vendor Advisory | |
References | () http://secunia.com/advisories/21847 - Vendor Advisory | |
References | () http://secunia.com/advisories/22291 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200608-21.xml - | |
References | () http://securitytracker.com/id?1016664 - | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-211.htm - | |
References | () http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2006/dsa-1146 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml - | |
References | () http://www.kb.cert.org/vuls/id/580124 - Patch, US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:139 - | |
References | () http://www.novell.com/linux/security/advisories/2006_20_sr.html - | |
References | () http://www.novell.com/linux/security/advisories/2006_22_sr.html - | |
References | () http://www.osvdb.org/27869 - | |
References | () http://www.osvdb.org/27870 - | |
References | () http://www.pdc.kth.se/heimdal/advisory/2006-08-08/ - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0612.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/442599/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/443498/100/100/threaded - | |
References | () http://www.securityfocus.com/bid/19427 - | |
References | () http://www.ubuntu.com/usn/usn-334-1 - | |
References | () http://www.vupen.com/english/advisories/2006/3225 - Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9515 - |
Information
Published : 2006-08-09 10:04
Updated : 2025-04-03 01:03
NVD link : CVE-2006-3083
Mitre link : CVE-2006-3083
CVE.ORG link : CVE-2006-3083
JSON object : View
Products Affected
heimdal
- heimdal
mit
- kerberos_5
CWE
CWE-399
Resource Management Errors