Логотип exploitDog
bind:"BDU:2015-08449" OR bind:"CVE-2008-3825"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2015-08449" OR bind:"CVE-2008-3825"

Количество 7

Количество 7

fstec логотип

BDU:2015-08449

больше 16 лет назад

Уязвимость операционной системы CentOS, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 4.4
EPSS: Низкий
ubuntu логотип

CVE-2008-3825

больше 16 лет назад

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.

CVSS2: 4.4
EPSS: Низкий
redhat логотип

CVE-2008-3825

больше 16 лет назад

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.

EPSS: Низкий
nvd логотип

CVE-2008-3825

больше 16 лет назад

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.

CVSS2: 4.4
EPSS: Низкий
github логотип

GHSA-7mvj-f88g-7mgj

около 3 лет назад

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.

EPSS: Низкий
oracle-oval логотип

ELSA-2008-0907

больше 16 лет назад

ELSA-2008-0907: pam_krb5 security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2015-06846

больше 16 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 4.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2015-08449

Уязвимость операционной системы CentOS, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 4.4
0%
Низкий
больше 16 лет назад
ubuntu логотип
CVE-2008-3825

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.

CVSS2: 4.4
0%
Низкий
больше 16 лет назад
redhat логотип
CVE-2008-3825

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.

0%
Низкий
больше 16 лет назад
nvd логотип
CVE-2008-3825

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.

CVSS2: 4.4
0%
Низкий
больше 16 лет назад
github логотип
GHSA-7mvj-f88g-7mgj

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.

0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2008-0907

ELSA-2008-0907: pam_krb5 security update (MODERATE)

больше 16 лет назад
fstec логотип
BDU:2015-06846

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 4.4
0%
Низкий
больше 16 лет назад

Уязвимостей на страницу