|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
[SA32119] pam_krb5 Credential Cache "exisiting_ticket" Security Bypass
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
link://[click]
TITLE:
pam_krb5 Credential Cache "exisiting_ticket" Security Bypass
SECUNIA ADVISORY ID:
SA32119
VERIFY ADVISORY:
link://[click]
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
Local system
SOFTWARE:
pam_krb5 2.x
link://[click]
DESCRIPTION:
A security issue has been reported in pam_krb5, which can be
exploited by malicious, local users to bypass certain security
restrictions.
The security issue is caused due to pam_krb5 not correctly
restricting users from reusing the existing credentials of another
user. This can be exploited to e.g. switch into another user's
account by setting the "KRB5CCNAME" variable to point to the
credentials cache of the target user.
Successful exploitation requires that the "existing_ticket" option is
enabled.
The security issue is reported in versions 2.2.0 to 2.2.25, 2.3.0,
and 2.3.1. Other versions may also be affected.
SOLUTION:
Update to version 2.3.2-1.
PROVIDED AND/OR DISCOVERED BY:
Stéphane Bertin
ORIGINAL ADVISORY:
RHSA-2008-0907:
link://[click]
Red Hat Bug #461960:
link://[click]
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
link://[click]
Definitions: (Criticality, Where etc.)
link://[click]
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|