Vulnerabilities
Vulnerable Software
Eyrie:  >> Pam-Krb5  >> 2.3  Security Vulnerabilities
pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
CVSS Score
5.0
EPSS Score
0.015
Published
2009-05-28
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
CVSS Score
6.2
EPSS Score
0.001
Published
2009-02-13


Contact Us

Shodan ® - All rights reserved