Upstream information

CVE-2008-3825 at MITRE

Description

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.4
Vector AV:L/AC:M/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 425861 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12
  • pam_krb5 >= 2.4.4-4.5
  • pam_krb5-32bit >= 2.4.4-4.5
Patchnames:
SUSE Linux Enterprise Desktop 12 GA pam_krb5
SUSE Linux Enterprise Desktop 12 SP1
  • pam_krb5 >= 2.4.4-4.5
  • pam_krb5-32bit >= 2.4.4-4.5
Patchnames:
SUSE Linux Enterprise Desktop 12 SP1 GA pam_krb5
SUSE Linux Enterprise Desktop 12 SP2
  • pam_krb5 >= 2.4.4-4.5
  • pam_krb5-32bit >= 2.4.4-4.5
Patchnames:
SUSE Linux Enterprise Desktop 12 SP2 GA pam_krb5
SUSE Linux Enterprise Desktop 12 SP3
  • pam_krb5 >= 2.4.4-4.5
  • pam_krb5-32bit >= 2.4.4-4.5
Patchnames:
SUSE Linux Enterprise Desktop 12 SP3 GA pam_krb5
SUSE Linux Enterprise Module for Basesystem 15
  • pam_krb5 >= 2.4.13-1.36
  • pam_krb5-32bit >= 2.4.13-1.36
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 GA pam_krb5
SUSE Linux Enterprise Server 11 SP1
  • pam_krb5 >= 2.3.1-47.10.15
  • pam_krb5-32bit >= 2.3.1-47.10.15
  • pam_krb5-x86 >= 2.3.1-47.10.15
Patchnames:
SUSE Linux Enterprise Server 11 SP1 GA pam_krb5
SUSE Linux Enterprise Server 11 SP2
  • pam_krb5 >= 2.3.1-47.10.15
  • pam_krb5-32bit >= 2.3.1-47.10.15
  • pam_krb5-x86 >= 2.3.1-47.10.15
Patchnames:
SUSE Linux Enterprise Server 11 SP2 GA pam_krb5
SUSE Linux Enterprise Server 11 SP3
  • pam_krb5 >= 2.3.1-47.12.1
  • pam_krb5-32bit >= 2.3.1-47.12.1
  • pam_krb5-x86 >= 2.3.1-47.12.1
Patchnames:
SUSE Linux Enterprise Server 11 SP3 GA pam_krb5
SUSE Linux Enterprise Server 11 SP4
  • pam_krb5 >= 2.3.1-47.12.1
  • pam_krb5-32bit >= 2.3.1-47.12.1
  • pam_krb5-x86 >= 2.3.1-47.12.1
Patchnames:
SUSE Linux Enterprise Server 11 SP4 GA pam_krb5
SUSE Linux Enterprise Server 12
  • pam_krb5 >= 2.4.4-4.5
  • pam_krb5-32bit >= 2.4.4-4.5
Patchnames:
SUSE Linux Enterprise Server 12 GA pam_krb5
SUSE Linux Enterprise Server 12 SP1
  • pam_krb5 >= 2.4.4-4.5
  • pam_krb5-32bit >= 2.4.4-4.5
Patchnames:
SUSE Linux Enterprise Server 12 SP1 GA pam_krb5
SUSE Linux Enterprise Server 12 SP2
  • pam_krb5 >= 2.4.4-4.5
  • pam_krb5-32bit >= 2.4.4-4.5
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA pam_krb5
SUSE Linux Enterprise Server 12 SP3
  • pam_krb5 >= 2.4.4-4.5
  • pam_krb5-32bit >= 2.4.4-4.5
Patchnames:
SUSE Linux Enterprise Server 12 SP3 GA pam_krb5
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • pam_krb5 >= 2.4.4-4.4
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA pam_krb5
openSUSE 11.0
  • pam_krb5-debuginfo >= 2.2.22-35.3
  • pam_krb5-debugsource >= 2.2.22-35.3
openSUSE 11.0
  • pam_krb5 >= 2.2.22-35.3
  • pam_krb5-32bit >= 2.2.22-35.3
  • pam_krb5-64bit >= 2.2.22-35.3
openSUSE Leap 42.1
  • pam_krb5 >= 2.4.4-8.2
  • pam_krb5-32bit >= 2.4.4-8.2
Patchnames:
openSUSE Leap 42.1 GA pam_krb5
openSUSE Leap 42.2
  • pam_krb5 >= 2.4.4-9.5
  • pam_krb5-32bit >= 2.4.4-9.5
Patchnames:
openSUSE Leap 42.2 GA pam_krb5
openSUSE Leap 42.3
  • pam_krb5 >= 2.4.4-11.4
  • pam_krb5-32bit >= 2.4.4-11.4
Patchnames:
openSUSE Leap 42.3 GA pam_krb5
openSUSE Tumbleweed
  • pam_krb5 >= 2.4.4-6.7
  • pam_krb5-32bit >= 2.4.4-6.7
Patchnames:
openSUSE Tumbleweed GA pam_krb5