Lucene search

K
freebsdFreeBSD0BB7677D-52F3-11D9-A9E7-0001020EED82
HistoryDec 06, 2004 - 12:00 a.m.

krb5 -- heap buffer overflow vulnerability in libkadm5srv

2004-12-0600:00:00
vuxml.freebsd.org
21

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

38.1%

A MIT krb5 Security Advisory reports:

The MIT Kerberos 5 administration library (libkadm5srv)
contains a heap buffer overflow in password history
handling code which could be exploited to execute
arbitrary code on a Key Distribution Center (KDC)
host. The overflow occurs during a password change of a
principal with a certain password history state. An
administrator must have performed a certain password
policy change in order to create the vulnerable state.
An authenticated user, not necessarily one with
administrative privileges, could execute arbitrary code on
the KDC host, compromising an entire Kerberos realm.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchkrb5< 1.3.6UNKNOWN
FreeBSDanynoarchkrb5-beta< 1.3.6UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.001

Percentile

38.1%