漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.
漏洞信息
N/A
漏洞
N/A
漏洞
pam_krb5 Existing Ticket 配置操作本地特权升级漏洞
漏洞信息
Red Hat Enterprise Linux (RHEL)的pam_krb5, 当existing_ticket选项被激活时,在读取一个Kerberos证书缓冲存储器时使用错误的特权,本地用户可以通过给任意一个缓存文件名设置可变的KRB5CCNAME环境变量并运行su或sudo程序来获得特权。
漏洞信息
N/A
漏洞
N/A