Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2011-2709
Description:libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs.
Test IDs: 1.3.6.1.4.1.25623.1.0.841191   1.3.6.1.4.1.25623.1.0.864469   1.3.6.1.4.1.25623.1.0.72456   1.3.6.1.4.1.25623.1.0.864295  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2011-2709
45075
http://secunia.com/advisories/45075
48490
http://www.securityfocus.com/bid/48490
50785
http://secunia.com/advisories/50785
50973
http://secunia.com/advisories/50973
FEDORA-2012-7971
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082297.html
FEDORA-2012-8067
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082072.html
SUSE-SU-2011:0696
http://lwn.net/Alerts/449415/
[oss-security] 20110721 CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization
http://www.openwall.com/lists/oss-security/2011/07/21/3
[oss-security] 20110722 Re: CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization
http://www.openwall.com/lists/oss-security/2011/07/22/4
[oss-security] 20110812 Re: CVE Request -- libgssapi, libgssglue -- Ability to load untrusted configuration file, when loading GSS mechanisms and their definitions during initialization
http://www.openwall.com/lists/oss-security/2011/08/12/10
http://www.citi.umich.edu/projects/nfsv4/linux/libgssglue/libgssglue-0.4.tar.gz
http://www.citi.umich.edu/projects/nfsv4/linux/libgssglue/libgssglue-0.4.tar.gz
https://bugzilla.novell.com/show_bug.cgi?id=694598
https://bugzilla.novell.com/show_bug.cgi?id=694598




© 1998-2025 E-Soft Inc. All rights reserved.