Lucene search

K
ubuntuUbuntuUSN-334-1
HistoryAug 16, 2006 - 12:00 a.m.

krb5 vulnerabilities

2006-08-1600:00:00
ubuntu.com
49

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.3

Confidence

Low

EPSS

0.001

Percentile

28.2%

Releases

  • Ubuntu 6.06
  • Ubuntu 5.10
  • Ubuntu 5.04

Details

Michael Calmer and Marcus Meissner discovered that several krb5 tools
did not check the return values from setuid() system calls. On systems
that have configured user process limits, it may be possible for an
attacker to cause setuid() to fail via resource starvation. In that
situation, the tools will not reduce their privilege levels, and will
continue operation as the root user.

By default, Ubuntu does not ship with user process limits.

Please note that these packages are not officially supported by Ubuntu
(they are in the ‘universe’ component of the archive).

OSVersionArchitecturePackageVersionFilename
Ubuntu6.06noarchkrb5-clients< 1.4.3-5ubuntu0.1UNKNOWN
Ubuntu6.06noarchkrb5-rsh-server< 1.4.3-5ubuntu0.1UNKNOWN
Ubuntu6.06noarchkrb5-ftpd< 1.4.3-5ubuntu0.1UNKNOWN
Ubuntu6.06noarchkrb5-user< 1.4.3-5ubuntu0.1UNKNOWN
Ubuntu5.10noarchkrb5-clients< 1.3.6-4ubuntu0.1UNKNOWN
Ubuntu5.10noarchkrb5-rsh-server< 1.3.6-4ubuntu0.1UNKNOWN
Ubuntu5.10noarchkrb5-ftpd< 1.3.6-4ubuntu0.1UNKNOWN
Ubuntu5.10noarchkrb5-user< 1.3.6-4ubuntu0.1UNKNOWN
Ubuntu5.04noarchkrb5-clients< 1.3.6-1ubuntu0.2UNKNOWN
Ubuntu5.04noarchkrb5-rsh-server< 1.3.6-1ubuntu0.2UNKNOWN
Rows per page:
1-10 of 121

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.3

Confidence

Low

EPSS

0.001

Percentile

28.2%