Vulnerability Name:

CVE-2004-0642 (CCN-17157)

Assigned:2004-08-31
Published:2004-08-31
Updated:2021-02-02
Summary:Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-415
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-0642

Source: CONECTIVA
Type: Broken Link
CLA-2004:860

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2004:860
Multiple vulnerabilities in Kerberos 5

Source: CCN
Type: AppleCare Knowledge Base Document 61798
Security Update 2004-12-02

Source: BUGTRAQ
Type: Issue Tracking, Third Party Advisory
20040913 [OpenPKG-SA-2004.039] OpenPKG Security Advisory (kerberos)

Source: CCN
Type: RHSA-2004-350
krb5 security update

Source: REDHAT
Type: Third Party Advisory
RHSA-2004:350

Source: CCN
Type: RHSA-2004-448
krb5 security update

Source: CCN
Type: SA16041
Kerberos V5 Multiple Vulnerabilities

Source: CCN
Type: Sun Alert ID: 57631
Security Vulnerabilities in the Kerberos Key Distribution Center (KDC) Daemon and Kerberos V5 Libraries

Source: CCN
Type: MIT Kerberos Web site
Kerberos: The Network Authentication Protocol

Source: CCN
Type: MIT krb5 Security Advisory 2004-002
double-free vulnerabilities in KDC and libraries

Source: CONFIRM
Type: Patch, Vendor Advisory
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt

Source: CCN
Type: CIAC Information Bulletin P-049
Apple Security Update 2004-12-02

Source: CCN
Type: Cisco Security Advisory 2004 August 31 1830 UTC (GMT)
Vulnerabilities in Kerberos 5 Implementation

Source: DEBIAN
Type: Third Party Advisory
DSA-543

Source: DEBIAN
Type: DSA-543
krb5 -- several vulnerabilities

Source: CCN
Type: GLSA-200409-09
MIT krb5: Multiple vulnerabilities

Source: GENTOO
Type: Third Party Advisory
GLSA-200409-09

Source: CCN
Type: US-CERT VU#795632
MIT Kerberos 5 ASN.1 decoding functions insecurely deallocate memory (double-free)

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#795632

Source: CCN
Type: OpenPKG-SA-2004.039
kerberos

Source: BID
Type: Third Party Advisory, VDB Entry
11078

Source: CCN
Type: BID-11078
MIT Kerberos 5 Multiple Double-Free Vulnerabilities

Source: TRUSTIX
Type: Broken Link
2004-0045

Source: CCN
Type: TLSA-2004-22
Double-free vulnerabilities allow abritrary code execution

Source: CCN
Type: USN-224-1
Kerberos vulnerabilities

Source: CERT
Type: Third Party Advisory, US Government Resource
TA04-247A

Source: XF
Type: Third Party Advisory, VDB Entry
kerberos-kdc-double-free(17157)

Source: XF
Type: UNKNOWN
kerberos-kdc-double-free(17157)

Source: OVAL
Type: Broken Link, Third Party Advisory
oval:org.mitre.oval:def:10709

Source: OVAL
Type: Broken Link, Third Party Advisory
oval:org.mitre.oval:def:4936

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mit:kerberos_5:*:*:*:*:*:*:*:* (Version <= 1.3.4)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9:*:x86:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9:*:sparc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10709
    V
    Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code.
    2013-04-29
    oval:org.mitre.oval:def:4936
    V
    Kerberos 5 KDC ASN.1 Error Handling Double-free Vulnerabilities
    2005-02-23
    oval:com.redhat.rhsa:def:20040350
    P
    RHSA-2004:350: krb5 security update (Critical)
    2004-08-31
    oval:org.debian:def:543
    V
    several vulnerabilities
    2004-08-31
    BACK
    mit kerberos 5 *
    debian debian linux 3.0
    redhat enterprise linux desktop 3.0
    redhat enterprise linux server 3.0
    redhat enterprise linux workstation 3.0
    mit kerberos 5-1.1
    mit kerberos 5-1.3
    mit kerberos 5-1.2.2
    mit kerberos 5-1.2
    mit kerberos 5-1.2.1
    mit kerberos 5-1.2.3
    mit kerberos 5-1.2.4
    mit kerberos 5-1.2.5
    mit kerberos 5-1.2.6
    mit kerberos 5-1.2.7
    mit kerberos 5-1.2.8
    mit kerberos 5-1.3.1
    mit kerberos 5-1.3.2
    mit kerberos 5-1.3.3
    mit kerberos 5-1.3.4
    debian debian linux 3.0
    openpkg openpkg current
    gentoo linux *
    mandrakesoft mandrake multi network firewall 8.2
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    conectiva linux 9.0
    mandrakesoft mandrake linux 9.2
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    sun solaris 9
    openpkg openpkg 2.0
    mandrakesoft mandrake linux 10.0
    redhat enterprise linux 3
    conectiva linux 10
    openpkg openpkg 2.1
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    apple mac os x 10.2.8
    apple mac os x server 10.2.8
    redhat enterprise linux 4
    redhat enterprise linux 4
    apple mac os x 10.3.6
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    mandrakesoft mandrake multi network firewall 2.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    turbolinux turbolinux home *
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux corporate server 2.1
    apple mac os x server 10.3.6
    sun solaris 9