Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2002-0754


Kerberos 5 su (k5su) in FreeBSD 4.4 and earlier relies on the getlogin system call to determine if the user running k5su is root, which could allow a root-initiated process to regain its privileges after it has dropped them.


Published

2002-08-12T04:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.2 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application freebsd heimdal 0.4e Yes
Application kth heimdal 0.4e Yes
Operating System freebsd freebsd 4.0 Yes
Operating System freebsd freebsd 4.1 Yes
Operating System freebsd freebsd 4.1.1 Yes
Operating System freebsd freebsd 4.1.1 Yes
Operating System freebsd freebsd 4.1.1 Yes
Operating System freebsd freebsd 4.2 Yes
Operating System freebsd freebsd 4.2 Yes
Operating System freebsd freebsd 4.3 Yes
Operating System freebsd freebsd 4.3 Yes
Operating System freebsd freebsd 4.3 Yes
Operating System freebsd freebsd 4.4 Yes

References