Логотип exploitDog
bind:CVE-2007-3149
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-3149

Количество 5

Количество 5

ubuntu логотип

CVE-2007-3149

больше 18 лет назад

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

CVSS2: 7.2
EPSS: Низкий
redhat логотип

CVE-2007-3149

больше 18 лет назад

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

EPSS: Низкий
nvd логотип

CVE-2007-3149

больше 18 лет назад

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

CVSS2: 7.2
EPSS: Низкий
debian логотип

CVE-2007-3149

больше 18 лет назад

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check ...

CVSS2: 7.2
EPSS: Низкий
github логотип

GHSA-76wc-mqwv-wjv2

больше 3 лет назад

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2007-3149

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

CVSS2: 7.2
0%
Низкий
больше 18 лет назад
redhat логотип
CVE-2007-3149

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

0%
Низкий
больше 18 лет назад
nvd логотип
CVE-2007-3149

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

CVSS2: 7.2
0%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-3149

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check ...

CVSS2: 7.2
0%
Низкий
больше 18 лет назад
github логотип
GHSA-76wc-mqwv-wjv2

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу