Computer Security
[EN] securityvulns.ru no-pyccku


MIT Kerberos multiple security vulnerabilities
Published:19.03.2008
Source:
SecurityVulns ID:8801
Type:remote
Threat Level:
8/10
Description:krb5kdc multiple memory corruptions. kadmin RPC library array overflow.
Affected:MIT : krb5 1.4
 MIT : krb5 1.5
 MIT : krb5 1.6
CVE:CVE-2008-0948 (Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.)
 CVE-2008-0947 (Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.)
 CVE-2008-0062 (KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.)
Original documentdocumentCERT, US-CERT Technical Cyber Security Alert TA08-079B -- MIT Kerberos Updates for Multiple Vulnerabilities (19.03.2008)
 documentMIT, MITKRB5-SA-2008-002: array overrun in RPC library used by kadmin (19.03.2008)
 documentMIT, MITKRB5-SA-2008-001: double-free, uninitialized data vulnerabilities in krb5kdc (19.03.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod