Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-3084

Опубликовано: 09 авг. 2006
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.

РелизСтатусПримечание
dapper

released

1.4.3-5ubuntu0.6
devel

released

1.6.dfsg.1-7
edgy

released

1.4.3-9ubuntu1.5
feisty

released

1.4.4-5ubuntu3.3
upstream

needs-triage

Показывать по

EPSS

Процентиль: 48%
0.00281
Низкий

7.2 High

CVSS2

Связанные уязвимости

nvd
больше 19 лет назад

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.

debian
больше 19 лет назад

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1 ...

github
больше 3 лет назад

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.

fstec
больше 19 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 48%
0.00281
Низкий

7.2 High

CVSS2