Lucene search

K
gentooGentoo FoundationGLSA-200701-21
HistoryJan 24, 2007 - 12:00 a.m.

MIT Kerberos 5: Arbitrary Remote Code Execution

2007-01-2400:00:00
Gentoo Foundation
security.gentoo.org
10

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.609 Medium

EPSS

Percentile

97.8%

Background

MIT Kerberos 5 is a suite of applications that implement the Kerberos network protocol.

Description

The Kerberos administration daemon, and possibly other applications using the GSS-API or RPC libraries, could potentially call a function pointer in a freed heap buffer, or attempt to free an uninitialized pointer.

Impact

A remote attacker may be able to crash an affected application, or potentially execute arbitrary code with root privileges.

Workaround

There is no known workaround at this time.

Resolution

All MIT Kerberos 5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-crypt/mit-krb5< 1.5.2UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.609 Medium

EPSS

Percentile

97.8%