Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2002-1235

Overview

Vulnerability Score 10.0 10.0
CVE Id CVE-2002-1235
Last Modified 05 Sep 2008 04:30:07
Published 04 Nov 2002 12:00:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2002-1235

Summary

The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.

Vulnerable Systems

Application

  • Kth Kerberos 4 1.2.1

  • Kth Kerberos 5 0.5.1

  • Mit Kerberos 5-1.2.6


References

CERT - CA-2002-29

CERT-VN - VU#875073

BID - 6024

DEBIAN - DSA-184

BUGTRAQ - 20021023 MITKRB5-SA-2002-002: Buffer overflow in kadmind4

REDHAT - RHSA-2002:242

CONFIRM - http://www.pdc.kth.se/heimdal/

MANDRAKE - MDKSA-2002:073

XF - kerberos-kadmind-bo(10430)

DEBIAN - DSA-185

DEBIAN - DSA-183

CONFIRM - http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt

CONFIRM - http://web.mit.edu/kerberos/www/advisories/2002-002-kadm4_attacksig.txt

BUGTRAQ - 20021027 Re: Buffer overflow in kadmind4

BUGTRAQ - 20021028 GLSA: krb5

BUGTRAQ - 20021026 Updated: MITKRB5-SA-2002-002: Buffer overflow in kadmind4

CONECTIVA - CLA-2002:534

BUGTRAQ - 20021027 KRB5-SORCERER2002-10-27 Security Update

NETBSD - NetBSD-SA2002-026


Last Updated: 27 May 2016 10:37:15