Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-0285

Опубликовано: 15 апр. 2011
Источник: debian
EPSS Средний

Описание

The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
krb5fixed1.9.1+dfsg-1package
krb5fixed1.8.3+dfsg-4squeeze1squeezepackage
krb5not-affectedlennypackage

Примечания

  • 1.6 is not affected: While the error case in the process_chpw_request()

  • in kadmind in 1.6 can leave the data pointer uninitialized, the error

  • path in its caller will not free() that pointer (the invalid pointer

  • goes out of scope without being freed), unlike in krb5-1.7 and later.

  • Those later releases add support for password changing over TCP, and

  • the error path in the TCP handling code is what frees the

  • uninitialized pointer. (Clarification by Tom Yu)

EPSS

Процентиль: 98%
0.51658
Средний

Связанные уязвимости

ubuntu
около 14 лет назад

The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.

redhat
около 14 лет назад

The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.

nvd
около 14 лет назад

The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.

github
около 3 лет назад

The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.

oracle-oval
около 14 лет назад

ELSA-2011-0447: krb5 security update (MODERATE)

EPSS

Процентиль: 98%
0.51658
Средний