search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Kerberos administration daemon may free uninitialized pointers

Vulnerability Note VU#831452

Original Release Date: 2007-01-09 | Last Revised: 2007-05-10

Overview

A vulnerability exists in the Kerberos administration daemon that may allow a remote, unauthenticated user to free uninitialized pointers. Freeing uninitialized pointers corrupts memory in a way that could allow an attacker to execute code.

Description

The MIT krb 5 administration daemon contains a vulnerability that may allow an attacker to execute arbitary code. According to MIT krb5 Security Advisory 2006-003:

This vulnerability results from memory management bugs in the "mechglue" abstraction interface of the GSS-API implementation.

Note that versions krb5-1.5 through krb5-1.5.1 are affected by this vulnerability. Other server applications that utilize the GSS-API library provided with MIT krb5 may also be affected.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code resulting in the compromise of the Kerberos key database or cause a denial of service.

Solution

Apply Patch

A patch as described in MIT krb5 Security Advisory 2006-003 can be obtained from MIT. MIT also states that this will be addressed in the upcoming krb5-1.6 release and krb5-1.5.2 patch release.

Vendor Information

831452
 

View all 91 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This issue is addressed in MIT krb5 Security Advisory 2006-003.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2006-6144
Severity Metric: 20.93
Date Public: 2007-01-09
Date First Published: 2007-01-09
Date Last Updated: 2007-05-10 14:26 UTC
Document Revision: 39

Sponsored by CISA.