Overview
The MIT Kerberos administration daemon (kadmind) contains a stack buffer overflow that may allow a remote, authenticated attacker to execute arbitrary code or cause a denial of service.
Description
A vulnerability exists in the way the principal renaming operation used by the Kerberos administration daemon handles strings and a fixed-size stack buffer. This vulnerability may cause a buffer overflow vulnerability that could allow a remote, authenticated user to execute arbitrary code. According to MIT krb5 Security Advisory MITKRB5-SA-2007-005: The kadmind code which performs the principal renaming operation passes unchecked string arguments to a sprintf() call which has a fixed-size stack buffer as its destination. These strings are the old and new principal names passed to the rename operation. The attacker needs to authenticate to kadmind to perform this attack, but no administrative privileges are required because the vulnerable code executes prior to privilege verification. |
Impact
A remote, authenticated user may be able to execute arbitrary code on an affected system or cause the affected program to crash, resulting in a denial of service. Secondary impacts of code execution include complete compromise of the Kerberos key database. |
Solution
Apply a patch |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=548
- http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-005.txt
- http://www.ubuntu.com/usn/usn-477-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:137
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102985-1
- http://secunia.com/advisories/25800/
- http://secunia.com/advisories/26033/
- http://docs.info.apple.com/article.html?artnum=306172
Acknowledgements
Thanks to MIT for reporting this vulnerability, who in turn credit an anonymous discoverer working with iDefense.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2007-2798 |
Severity Metric: | 16.80 |
Date Public: | 2007-06-26 |
Date First Published: | 2007-06-26 |
Date Last Updated: | 2007-08-14 20:06 UTC |
Document Revision: | 16 |