Lucene search

K
freebsdFreeBSD6A3C3E5C-66CB-11E0-A116-C535F3AA24F0
HistoryApr 12, 2011 - 12:00 a.m.

krb5 -- MITKRB5-SA-2011-004, kadmind invalid pointer free() [CVE-2011-0285]

2011-04-1200:00:00
vuxml.freebsd.org
18

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.246 Low

EPSS

Percentile

96.7%

An advisory published by the MIT Kerberos team says:

The password-changing capability of the MIT krb5 administration
daemon (kadmind) has a bug that can cause it to attempt to free()
an invalid pointer under certain error conditions. This can cause
the daemon to crash or induce the execution of arbitrary code
(which is believed to be difficult). No exploit that executes
arbitrary code is known to exist, but it is easy to trigger a
denial of service manually.
Some platforms detect attempted freeing of invalid pointers and
protectively terminate the process, preventing arbitrary code
execution on those platforms.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchkrb5= 1.7UNKNOWN
FreeBSDanynoarchkrb5< 1.7.2UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.246 Low

EPSS

Percentile

96.7%