Vulnerabilities > Eyrie

DATE CVE VULNERABILITY TITLE RISK
2018-04-03 CVE-2018-0493 Use After Free vulnerability in multiple products
remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
network
low complexity
eyrie debian CWE-416
7.2
2009-05-28 CVE-2009-1384 Improper Authentication vulnerability in Eyrie Pam-Krb5 2.2.14/2.3/2.3.4
pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
network
low complexity
redhat eyrie CWE-287
5.0
2009-02-13 CVE-2009-0361 Permissions, Privileges, and Access Controls vulnerability in Eyrie Pam-Krb5
Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.
local
low complexity
eyrie CWE-264
4.6
2009-02-13 CVE-2009-0360 Improper Authentication vulnerability in Eyrie Pam-Krb5
Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.
local
high complexity
eyrie CWE-287
6.2