CVE-2009-0360
pam-krb5 <3.13 - Privilege Escalation
Title source: llmDescription
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Jon Oberheide · clocallinux
https://www.exploit-db.com/exploits/8303
References (18)
Scores
EPSS
0.0023
EPSS Percentile
45.8%
Classification
CWE
CWE-287
Status
draft
Affected Products (20)
eyrie/pam-krb5
< 3.12
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
eyrie/pam-krb5
... and 5 more
Timeline
Published
Feb 13, 2009
Tracked Since
Feb 18, 2026