Upstream information

CVE-2006-3083 at MITRE

Description

The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
SUSE Bugzilla entry: 182351 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SuSE Linux Desktop 1.0
  • heimdal >= 0.4e-419
  • heimdal-lib >= 0.4e-419
ul1.s390
slrs8.x86
YOU Patch Nr: 11191
SUSE LINUX Retail Solution 8
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • heimdal >= 0.4e-418
  • heimdal-devel >= 0.4e-418
  • heimdal-lib >= 0.4e-418
ul1.s390
slrs8.x86
YOU Patch Nr: 11191
SUSE LINUX 10.0
  • krb5-apps-clients >= 1.4.1-5.2
  • krb5-apps-servers >= 1.4.1-5.2
SUSE LINUX 10.1
  • krb5-apps-clients >= 1.4.3-19.5
  • krb5-apps-servers >= 1.4.3-19.5
SUSE LINUX 9.3
  • krb5-apps-clients >= 1.4-16.6
  • krb5-apps-servers >= 1.4-16.6