CVE-2006-3084
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.
Los programas (1) ftpd y (2) ksu en MIT Kerberos 5 (krb5) actualizado a 1.5, y 1.4.X anterior a 1.4.4, no valida el código de retorno para las llamadas setuid, lo cual permite a un usuario local ganar privilegios provocando fallos del setuid para subir privilegios. NOTA: con en 20060808,
no se conoce si existe un panorama explotable para estas ediciones.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-06-19 CVE Reserved
- 2006-08-09 CVE Published
- 2024-06-29 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (25)
URL | Tag | Source |
---|---|---|
ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt | X_refsource_confirm | |
http://securitytracker.com/id?1016664 | Vdb Entry | |
http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt | X_refsource_confirm | |
http://www.kb.cert.org/vuls/id/401660 | Third Party Advisory | |
http://www.osvdb.org/27871 | Vdb Entry | |
http://www.osvdb.org/27872 | Vdb Entry | |
http://www.pdc.kth.se/heimdal/advisory/2006-08-08 | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/442599/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/443498/100/100/threaded | Mailing List | |
http://www.securityfocus.com/bid/19427 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://fedoranews.org/cms/node/2376 | 2020-01-21 | |
http://secunia.com/advisories/21402 | 2020-01-21 | |
http://secunia.com/advisories/21436 | 2020-01-21 | |
http://secunia.com/advisories/21439 | 2020-01-21 | |
http://secunia.com/advisories/21461 | 2020-01-21 | |
http://secunia.com/advisories/21467 | 2020-01-21 | |
http://secunia.com/advisories/21527 | 2020-01-21 | |
http://secunia.com/advisories/21613 | 2020-01-21 | |
http://secunia.com/advisories/23707 | 2020-01-21 | |
http://security.gentoo.org/glsa/glsa-200608-21.xml | 2020-01-21 | |
http://www.debian.org/security/2006/dsa-1146 | 2020-01-21 | |
http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml | 2020-01-21 | |
http://www.novell.com/linux/security/advisories/2006_20_sr.html | 2020-01-21 | |
http://www.ubuntu.com/usn/usn-334-1 | 2020-01-21 | |
http://www.vupen.com/english/advisories/2006/3225 | 2020-01-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Heimdal Search vendor "Heimdal" | Heimdal Search vendor "Heimdal" for product "Heimdal" | <= 0.7.2 Search vendor "Heimdal" for product "Heimdal" and version " <= 0.7.2" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.4 Search vendor "Mit" for product "Kerberos 5" and version "1.4" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.4.1 Search vendor "Mit" for product "Kerberos 5" and version "1.4.1" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.4.2 Search vendor "Mit" for product "Kerberos 5" and version "1.4.2" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.4.3 Search vendor "Mit" for product "Kerberos 5" and version "1.4.3" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.5 Search vendor "Mit" for product "Kerberos 5" and version "1.5" | - |
Affected
|