Description
Kerberos 5 su (k5su) in FreeBSD 4.4 and earlier relies on the getlogin system call to determine if the user running k5su is root, which could allow a root-initiated process to regain its privileges after it has dropped them.
Products
- FreeBSD Heimdal Port 0.4e
- KTH Heimdal 0.4e
- FreeBSD 4.0
- FreeBSD 4.1.1
- FreeBSD 4.1.1 Release
- FreeBSD 4.1.1 Stable
- FreeBSD 4.1
- FreeBSD 4.2
- FreeBSD 4.2 Stable
- FreeBSD 4.3
- FreeBSD 4.3
- FreeBSD 4.3 Patch 24
- FreeBSD 4.3 Patch 37
- FreeBSD 4.3 Patch 38
- FreeBSD 4.3 Patch 40
- FreeBSD 4.3 Patch 41
- FreeBSD 4.3 Patch 42
- FreeBSD 4.3 Release Candidate
- FreeBSD 4.3 Release
- FreeBSD 4.3 Stable
- FreeBSD 4.4
- FreeBSD 4.4
- FreeBSD 4.4 Patch 27
- FreeBSD 4.4 Patch 41
- FreeBSD 4.4 Patch 42
- FreeBSD 4.4 Patch 44
- FreeBSD 4.4 Patch 45
- FreeBSD 4.4 Patch 46
- FreeBSD 4.4 Patch 47
- FreeBSD 4.4 Patch 4
- FreeBSD 4.4 Patch 8
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2002-0754, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-0754 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References