CVE-2006-3084

Source
https://nvd.nist.gov/vuln/detail/CVE-2006-3084
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2006-3084.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2006-3084
Related
Published
2006-08-09T10:04:00Z
Modified
2024-11-21T00:12:47Z
Summary
[none]
Details

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.

References

Affected packages

Debian:11 / krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.3-9

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.3-9

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.3-9

Ecosystem specific

{
    "urgency": "medium"
}