krb5: local privilege escalation
| Package(s): | krb5 | CVE #(s): | CVE-2006-3083 | ||||||||||||||||||||||||||||||||||||||||
| Created: | August 9, 2006 | Updated: | July 7, 2010 | ||||||||||||||||||||||||||||||||||||||||
| Description: | Some kerberos applications fail to check the results of setuid() calls, with the result that, if that call fails, they could continue to execute as root after thinking they had switched to a nonprivileged user. A local attacker who can cause these calls to fail (through resource exhaustion, presumably) could exploit this bug to gain root privileges. | ||||||||||||||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||||||||||||||
