Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTA-2006-AVI-356
Vulnerability from certfr_avis
None
Description
Kerberos est un protocole d'authentification crée par le MIT. Il fonctionne sur le principe de tickets donnant différents droits d'accès (période de validité, services accordés, etc). L'implémentation la plus fréquente est la version 5 du MIT, nommée krb5.
Plusieurs vulnérabilités ont été identifiées dans ce dernier. Sous certaines conditions, différentes applications fournies avec krb5 (krshd, v4rcp, ftpd, ksu) ne contrôleraient pas de manière suffisamment rigoureuse les appels aux fonctions système setuid() et seteuid(). Ces dernières fixent les propriétés UIDs/GIDs (pour User/Group IDs) d'un processus. Un utilisateur malveillant local au système pourrait exploiter ces vulnérabilités pour élever ses privilèges à ceux d'administrateur (root) et exécuter des commandes arbitraires sur le système.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
La version 1.5 et 1.4.3 ainsi que celles antérieures.
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eLa version 1.5 et 1.4.3 ainsi que celles ant\u00e9rieures.\u003c/P\u003e",
"content": "## Description\n\nKerberos est un protocole d\u0027authentification cr\u00e9e par le MIT. Il\nfonctionne sur le principe de tickets donnant diff\u00e9rents droits d\u0027acc\u00e8s\n(p\u00e9riode de validit\u00e9, services accord\u00e9s, etc). L\u0027impl\u00e9mentation la plus\nfr\u00e9quente est la version 5 du MIT, nomm\u00e9e krb5.\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans ce dernier. Sous\ncertaines conditions, diff\u00e9rentes applications fournies avec krb5\n(krshd, v4rcp, ftpd, ksu) ne contr\u00f4leraient pas de mani\u00e8re suffisamment\nrigoureuse les appels aux fonctions syst\u00e8me setuid() et seteuid(). Ces\nderni\u00e8res fixent les propri\u00e9t\u00e9s UIDs/GIDs (pour User/Group IDs) d\u0027un\nprocessus. Un utilisateur malveillant local au syst\u00e8me pourrait\nexploiter ces vuln\u00e9rabilit\u00e9s pour \u00e9lever ses privil\u00e8ges \u00e0 ceux\nd\u0027administrateur (root) et ex\u00e9cuter des commandes arbitraires sur le\nsyst\u00e8me.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-3084",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3084"
},
{
"name": "CVE-2006-3083",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3083"
}
],
"initial_release_date": "2006-08-16T00:00:00",
"last_revision_date": "2006-08-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-334-1 du 16 ao\u00fbt 2006 :",
"url": "http://www.ubuntu.com/usn/usn-334-1"
},
{
"title": "Mise \u00e0 jour propos\u00e9e par le MIT pour les versions 1.5 de Kerberos krb5 du 08 ao\u00fbt 2006 :",
"url": "http://web.mit.edu/Kerberos/advisories/2006-001-patch_1.5.txt"
},
{
"title": "Mise \u00e0 jour Fedora FEDORA-2006-905 du 09 ao\u00fbt 2006 :",
"url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1146-1 du 09 ao\u00fbt 2006 :",
"url": "http://www.debian.org/security/2006/dsa-1146"
},
{
"title": "Mise \u00e0 jour Fedora FEDORA-2006-905 du 09 ao\u00fbt 2006 :",
"url": "http://www.redhat.com/archives/fedora-package-announce/2006-August/msg00023.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0612-8 du 08 ao\u00fbt 2006 :",
"url": "http://rhn.redhat.com/errata/RHSA-2006-0612.html"
},
{
"title": "Mise \u00e0 jour propos\u00e9e par le MIT pour les versions 1.4.3 de Kerberos krb5 du 08 ao\u00fbt 2006 :",
"url": "http://web.mit.edu/Kerberos/advisories/2006-001-patch_1.4.3.txt"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 MITKRB5-SA-2006-001 du 08 ao\u00fbt 2OO6 :",
"url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt"
},
{
"title": "Page du projet MIT Kerberos Version 5 krb5 :",
"url": "http://web.mit.edu/Kerberos/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2006:139 du 09 ao\u00fbt 2006 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:139"
}
],
"reference": "CERTA-2006-AVI-356",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2006-08-16T00:00:00.000000"
},
{
"description": "ajout des bulletins de s\u00e9curit\u00e9 Ubuntu, Debian, Fedora, RedHat et Mandriva.",
"revision_date": "2006-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": null,
"title": "Plusieurs vuln\u00e9rabilit\u00e9s dans MIT Kerberos krb5",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 MITKRB5-SA-2006-001 du 08 ao\u00fbt 2006",
"url": null
}
]
}
CVE-2006-3083 (GCVE-0-2006-3083)
Vulnerability from cvelistv5
- n/a
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:16:05.682Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MDKSA-2006:139",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:139"
},
{
"name": "VU#580124",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/580124"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-211.htm"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt"
},
{
"name": "27869",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/27869"
},
{
"name": "21847",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21847"
},
{
"name": "SUSE-SR:2006:020",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
},
{
"name": "GLSA-200608-21",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200608-21.xml"
},
{
"name": "21461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21461"
},
{
"name": "21467",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21467"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt"
},
{
"name": "DSA-1146",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-1146"
},
{
"name": "RHSA-2006:0612",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0612.html"
},
{
"name": "21436",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21436"
},
{
"name": "ADV-2006-3225",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3225"
},
{
"name": "21527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21527"
},
{
"name": "27870",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/27870"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.pdc.kth.se/heimdal/advisory/2006-08-08/"
},
{
"name": "20060808 MITKRB-SA-2006-001: multiple local privilege escalation vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/442599/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:9515",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9515"
},
{
"name": "21439",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21439"
},
{
"name": "21402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21402"
},
{
"name": "20060816 UPDATED: MITKRB5-SA-2006-001: multiple local privilege escalation vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/443498/100/100/threaded"
},
{
"name": "21613",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21613"
},
{
"name": "SUSE-SR:2006:022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2006_22_sr.html"
},
{
"name": "1016664",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016664"
},
{
"name": "21441",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21441"
},
{
"name": "22291",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22291"
},
{
"name": "21456",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21456"
},
{
"name": "GLSA-200608-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml"
},
{
"name": "21423",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21423"
},
{
"name": "USN-334-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-334-1"
},
{
"name": "19427",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19427"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-18T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "MDKSA-2006:139",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:139"
},
{
"name": "VU#580124",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/580124"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-211.htm"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt"
},
{
"name": "27869",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/27869"
},
{
"name": "21847",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21847"
},
{
"name": "SUSE-SR:2006:020",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
},
{
"name": "GLSA-200608-21",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200608-21.xml"
},
{
"name": "21461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21461"
},
{
"name": "21467",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21467"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt"
},
{
"name": "DSA-1146",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-1146"
},
{
"name": "RHSA-2006:0612",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2006-0612.html"
},
{
"name": "21436",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21436"
},
{
"name": "ADV-2006-3225",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3225"
},
{
"name": "21527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21527"
},
{
"name": "27870",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/27870"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.pdc.kth.se/heimdal/advisory/2006-08-08/"
},
{
"name": "20060808 MITKRB-SA-2006-001: multiple local privilege escalation vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/442599/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:9515",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9515"
},
{
"name": "21439",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21439"
},
{
"name": "21402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21402"
},
{
"name": "20060816 UPDATED: MITKRB5-SA-2006-001: multiple local privilege escalation vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/443498/100/100/threaded"
},
{
"name": "21613",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21613"
},
{
"name": "SUSE-SR:2006:022",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2006_22_sr.html"
},
{
"name": "1016664",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016664"
},
{
"name": "21441",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21441"
},
{
"name": "22291",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22291"
},
{
"name": "21456",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21456"
},
{
"name": "GLSA-200608-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml"
},
{
"name": "21423",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21423"
},
{
"name": "USN-334-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-334-1"
},
{
"name": "19427",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19427"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3083",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "MDKSA-2006:139",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:139"
},
{
"name": "VU#580124",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/580124"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-211.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-211.htm"
},
{
"name": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt",
"refsource": "CONFIRM",
"url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt"
},
{
"name": "27869",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27869"
},
{
"name": "21847",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21847"
},
{
"name": "SUSE-SR:2006:020",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
},
{
"name": "GLSA-200608-21",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200608-21.xml"
},
{
"name": "21461",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21461"
},
{
"name": "21467",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21467"
},
{
"name": "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt",
"refsource": "CONFIRM",
"url": "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt"
},
{
"name": "DSA-1146",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1146"
},
{
"name": "RHSA-2006:0612",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2006-0612.html"
},
{
"name": "21436",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21436"
},
{
"name": "ADV-2006-3225",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3225"
},
{
"name": "21527",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21527"
},
{
"name": "27870",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27870"
},
{
"name": "http://www.pdc.kth.se/heimdal/advisory/2006-08-08/",
"refsource": "CONFIRM",
"url": "http://www.pdc.kth.se/heimdal/advisory/2006-08-08/"
},
{
"name": "20060808 MITKRB-SA-2006-001: multiple local privilege escalation vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/442599/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:9515",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9515"
},
{
"name": "21439",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21439"
},
{
"name": "21402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21402"
},
{
"name": "20060816 UPDATED: MITKRB5-SA-2006-001: multiple local privilege escalation vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443498/100/100/threaded"
},
{
"name": "21613",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21613"
},
{
"name": "SUSE-SR:2006:022",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_22_sr.html"
},
{
"name": "1016664",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016664"
},
{
"name": "21441",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21441"
},
{
"name": "22291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/22291"
},
{
"name": "21456",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21456"
},
{
"name": "GLSA-200608-15",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml"
},
{
"name": "21423",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21423"
},
{
"name": "USN-334-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-334-1"
},
{
"name": "19427",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19427"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3083",
"datePublished": "2006-08-09T10:00:00",
"dateReserved": "2006-06-19T00:00:00",
"dateUpdated": "2024-08-07T18:16:05.682Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-3084 (GCVE-0-2006-3084)
Vulnerability from cvelistv5
- n/a
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:16:05.926Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2007-034",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://fedoranews.org/cms/node/2376"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt"
},
{
"name": "SUSE-SR:2006:020",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
},
{
"name": "VU#401660",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/401660"
},
{
"name": "GLSA-200608-21",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200608-21.xml"
},
{
"name": "21461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21461"
},
{
"name": "21467",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21467"
},
{
"name": "27872",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/27872"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt"
},
{
"name": "DSA-1146",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2006/dsa-1146"
},
{
"name": "21436",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21436"
},
{
"name": "ADV-2006-3225",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3225"
},
{
"name": "21527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21527"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.pdc.kth.se/heimdal/advisory/2006-08-08/"
},
{
"name": "20060808 MITKRB-SA-2006-001: multiple local privilege escalation vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/442599/100/0/threaded"
},
{
"name": "23707",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23707"
},
{
"name": "21439",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21439"
},
{
"name": "21402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21402"
},
{
"name": "20060816 UPDATED: MITKRB5-SA-2006-001: multiple local privilege escalation vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/443498/100/100/threaded"
},
{
"name": "21613",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21613"
},
{
"name": "1016664",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016664"
},
{
"name": "GLSA-200608-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml"
},
{
"name": "27871",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/27871"
},
{
"name": "USN-334-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-334-1"
},
{
"name": "19427",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19427"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-18T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "FEDORA-2007-034",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://fedoranews.org/cms/node/2376"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt"
},
{
"name": "SUSE-SR:2006:020",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
},
{
"name": "VU#401660",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/401660"
},
{
"name": "GLSA-200608-21",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200608-21.xml"
},
{
"name": "21461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21461"
},
{
"name": "21467",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21467"
},
{
"name": "27872",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/27872"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt"
},
{
"name": "DSA-1146",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2006/dsa-1146"
},
{
"name": "21436",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21436"
},
{
"name": "ADV-2006-3225",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3225"
},
{
"name": "21527",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21527"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.pdc.kth.se/heimdal/advisory/2006-08-08/"
},
{
"name": "20060808 MITKRB-SA-2006-001: multiple local privilege escalation vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/442599/100/0/threaded"
},
{
"name": "23707",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23707"
},
{
"name": "21439",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21439"
},
{
"name": "21402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21402"
},
{
"name": "20060816 UPDATED: MITKRB5-SA-2006-001: multiple local privilege escalation vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/443498/100/100/threaded"
},
{
"name": "21613",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21613"
},
{
"name": "1016664",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016664"
},
{
"name": "GLSA-200608-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml"
},
{
"name": "27871",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/27871"
},
{
"name": "USN-334-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-334-1"
},
{
"name": "19427",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19427"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3084",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2007-034",
"refsource": "FEDORA",
"url": "http://fedoranews.org/cms/node/2376"
},
{
"name": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt",
"refsource": "CONFIRM",
"url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt"
},
{
"name": "SUSE-SR:2006:020",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html"
},
{
"name": "VU#401660",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/401660"
},
{
"name": "GLSA-200608-21",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200608-21.xml"
},
{
"name": "21461",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21461"
},
{
"name": "21467",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21467"
},
{
"name": "27872",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27872"
},
{
"name": "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt",
"refsource": "CONFIRM",
"url": "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt"
},
{
"name": "DSA-1146",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2006/dsa-1146"
},
{
"name": "21436",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21436"
},
{
"name": "ADV-2006-3225",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3225"
},
{
"name": "21527",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21527"
},
{
"name": "http://www.pdc.kth.se/heimdal/advisory/2006-08-08/",
"refsource": "CONFIRM",
"url": "http://www.pdc.kth.se/heimdal/advisory/2006-08-08/"
},
{
"name": "20060808 MITKRB-SA-2006-001: multiple local privilege escalation vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/442599/100/0/threaded"
},
{
"name": "23707",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/23707"
},
{
"name": "21439",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21439"
},
{
"name": "21402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21402"
},
{
"name": "20060816 UPDATED: MITKRB5-SA-2006-001: multiple local privilege escalation vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/443498/100/100/threaded"
},
{
"name": "21613",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21613"
},
{
"name": "1016664",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016664"
},
{
"name": "GLSA-200608-15",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml"
},
{
"name": "27871",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/27871"
},
{
"name": "USN-334-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-334-1"
},
{
"name": "19427",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19427"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3084",
"datePublished": "2006-08-09T10:00:00",
"dateReserved": "2006-06-19T00:00:00",
"dateUpdated": "2024-08-07T18:16:05.926Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.