10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.294 Low
EPSS
Percentile
96.9%
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | heimdal | < 0.4e-22 | heimdal_0.4e-22_all.deb |
Debian | 11 | all | heimdal | < 0.4e-22 | heimdal_0.4e-22_all.deb |
Debian | 999 | all | heimdal | < 0.4e-22 | heimdal_0.4e-22_all.deb |
Debian | 13 | all | heimdal | < 0.4e-22 | heimdal_0.4e-22_all.deb |
Debian | 12 | all | krb5 | < 1.2.6-2 | krb5_1.2.6-2_all.deb |
Debian | 11 | all | krb5 | < 1.2.6-2 | krb5_1.2.6-2_all.deb |
Debian | 999 | all | krb5 | < 1.2.6-2 | krb5_1.2.6-2_all.deb |
Debian | 13 | all | krb5 | < 1.2.6-2 | krb5_1.2.6-2_all.deb |