Lucene search

K
freebsdFreeBSD0BB7677D-52F3-11D9-A9E7-0001020EED82
HistoryDec 06, 2004 - 12:00 a.m.

krb5 -- heap buffer overflow vulnerability in libkadm5srv

2004-12-0600:00:00
vuxml.freebsd.org
13

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

37.1%

A MIT krb5 Security Advisory reports:

The MIT Kerberos 5 administration library (libkadm5srv)
contains a heap buffer overflow in password history
handling code which could be exploited to execute
arbitrary code on a Key Distribution Center (KDC)
host. The overflow occurs during a password change of a
principal with a certain password history state. An
administrator must have performed a certain password
policy change in order to create the vulnerable state.
An authenticated user, not necessarily one with
administrative privileges, could execute arbitrary code on
the KDC host, compromising an entire Kerberos realm.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchkrb5< 1.3.6UNKNOWN
FreeBSDanynoarchkrb5-beta< 1.3.6UNKNOWN

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

37.1%