Vulnerability Name:

CVE-2004-0643 (CCN-17159)

Assigned:2004-08-31
Published:2004-08-31
Updated:2021-02-02
Summary:Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-415
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-0643

Source: CONECTIVA
Type: Broken Link
CLA-2004:860

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2004:860
Multiple vulnerabilities in Kerberos 5

Source: CCN
Type: AppleCare Knowledge Base Document 61798
Security Update 2004-12-02

Source: BUGTRAQ
Type: Issue Tracking, Third Party Advisory
20040913 [OpenPKG-SA-2004.039] OpenPKG Security Advisory (kerberos)

Source: CCN
Type: RHSA-2004-350
krb5 security update

Source: REDHAT
Type: Third Party Advisory
RHSA-2004:350

Source: CCN
Type: RHSA-2004-448
krb5 security update

Source: CCN
Type: Sun Alert ID: 57631
Security Vulnerabilities in the Kerberos KeyDistribution Center (KDC) Daemon and Kerberos V5 Libraries

Source: CCN
Type: MIT Kerberos Web site
Kerberos: The Network Authentication Protocol

Source: CONFIRM
Type: Patch, Vendor Advisory
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt

Source: CCN
Type: CIAC Information Bulletin P-049
Apple Security Update 2004-12-02

Source: CCN
Type: Cisco Security Advisory 2004 August 31 1830 UTC (GMT)
Vulnerabilities in Kerberos 5 Implementation

Source: DEBIAN
Type: Third Party Advisory
DSA-543

Source: DEBIAN
Type: DSA-543
krb5 -- several vulnerabilities

Source: CCN
Type: GLSA-200409-09
MIT krb5: Multiple vulnerabilities

Source: GENTOO
Type: Vendor Advisory
GLSA-200409-09

Source: CCN
Type: US-CERT VU#866472
MIT Kerberos 5 ASN.1 decoding function krb5_rd_cred() insecurely deallocates memory (double-free)

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#866472

Source: CCN
Type: OpenPKG-SA-2004.039
kerberos

Source: BID
Type: Third Party Advisory, VDB Entry
11078

Source: CCN
Type: BID-11078
MIT Kerberos 5 Multiple Double-Free Vulnerabilities

Source: TRUSTIX
Type: Broken Link
2004-0045

Source: CCN
Type: TLSA-2004-22
Double-free vulnerabilities allow abritrary code execution

Source: CERT
Type: Third Party Advisory, US Government Resource
TA04-247A

Source: XF
Type: Third Party Advisory, VDB Entry
kerberos-krb5rdcred-double-free(17159)

Source: XF
Type: UNKNOWN
kerberos-krb5rdcred-double-free(17159)

Source: OVAL
Type: Broken Link, Third Party Advisory
oval:org.mitre.oval:def:10267

Source: OVAL
Type: Broken Link, Third Party Advisory
oval:org.mitre.oval:def:3322

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mit:kerberos_5:*:*:*:*:*:*:*:* (Version <= 1.3.3)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9:*:x86:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9:*:sparc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10267
    V
    Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code.
    2013-04-29
    oval:org.mitre.oval:def:3322
    V
    Kerberos 5 Double-free Vulnerability in krb5_rd_cred Function
    2005-02-23
    oval:com.redhat.rhsa:def:20040350
    P
    RHSA-2004:350: krb5 security update (Critical)
    2004-08-31
    oval:org.debian:def:543
    V
    several vulnerabilities
    2004-08-31
    BACK
    mit kerberos 5 *
    debian debian linux 3.0
    redhat enterprise linux desktop 3.0
    redhat enterprise linux server 3.0
    redhat enterprise linux workstation 3.0
    mit kerberos 5-1.1
    mit kerberos 5-1.3
    mit kerberos 5-1.2.2
    mit kerberos 5-1.2
    mit kerberos 5-1.2.1
    mit kerberos 5-1.2.3
    mit kerberos 5-1.2.4
    mit kerberos 5-1.2.5
    mit kerberos 5-1.2.6
    mit kerberos 5-1.2.7
    mit kerberos 5-1.2.8
    mit kerberos 5-1.3.1
    debian debian linux 3.0
    openpkg openpkg current
    gentoo linux *
    mandrakesoft mandrake multi network firewall 8.2
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 9.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    conectiva linux 9.0
    mandrakesoft mandrake linux 9.2
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    sun solaris 9
    openpkg openpkg 2.0
    mandrakesoft mandrake linux 10.0
    redhat enterprise linux 3
    conectiva linux 10
    openpkg openpkg 2.1
    apple mac os x 10.2.8
    apple mac os x server 10.2.8
    apple mac os x 10.3.6
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 9.1
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux corporate server 2.1
    apple mac os x server 10.3.6
    sun solaris 9