René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

167 lines
5.2 KiB
JSON

{
"id": "CVE-2006-3084",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-08-09T10:04:00.000",
"lastModified": "2020-01-21T15:45:33.223",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues."
},
{
"lang": "es",
"value": "Los programas (1) ftpd y (2) ksu en MIT Kerberos 5 (krb5) actualizado a 1.5, y 1.4.X anterior a 1.4.4, no valida el c\u00f3digo de retorno para las llamadas setuid, lo cual permite a un usuario local ganar privilegios provocando fallos del setuid para subir privilegios. NOTA: con en 20060808, \t\r\nno se conoce si existe un panorama explotable para estas ediciones."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heimdal:heimdal:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.7.2",
"matchCriteriaId": "BF01089D-8C6F-4AAD-B68F-0EB623604403"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "52F0EECF-7787-442B-9888-D22F7D36C3DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EF344AED-BE00-4A9B-A9DE-C6FB0BEE4617"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "567406CA-58D8-453E-B36E-6D1D2EFC8EB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7830E03F-A813-4E35-893E-BF27395CEFB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD315AE-868B-4061-BF01-CDBF59B02499"
}
]
}
]
}
],
"references": [
{
"url": "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt",
"source": "cve@mitre.org"
},
{
"url": "http://fedoranews.org/cms/node/2376",
"source": "cve@mitre.org"
},
{
"url": "http://security.gentoo.org/glsa/glsa-200608-21.xml",
"source": "cve@mitre.org"
},
{
"url": "http://securitytracker.com/id?1016664",
"source": "cve@mitre.org"
},
{
"url": "http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2006-001-setuid.txt",
"source": "cve@mitre.org"
},
{
"url": "http://www.debian.org/security/2006/dsa-1146",
"source": "cve@mitre.org"
},
{
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-15.xml",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/401660",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_20_sr.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.pdc.kth.se/heimdal/advisory/2006-08-08/",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/442599/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/443498/100/100/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/19427",
"source": "cve@mitre.org"
},
{
"url": "http://www.ubuntu.com/usn/usn-334-1",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2006/3225",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}