Vulnerability Name: CVE-2004-1189 (CCN-18621) Assigned: 2004-12-20 Published: 2004-12-20 Updated: 2021-02-02 Summary: The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow. CVSS v3 Severity: 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-787 Vulnerability Consequences: Gain Access References: Source: CCN Type: BugTraq Mailing List, Mon Dec 20 2004 - 16:58:43 CST MITKRB5-SA-2004-004: heap overflow in libkadm5srv Source: CCN Type: Sun Alert ID: 57712Security Vulnerability in Kerberos 5 Administration Library for Solaris/SEAM Source: MITRE Type: CNACVE-2004-1189 Source: CONECTIVA Type: Broken LinkCLA-2005:917 Source: APPLE Type: Mailing List, Third Party AdvisoryAPPLE-SA-2005-08-17 Source: APPLE Type: Mailing List, Third Party AdvisoryAPPLE-SA-2005-08-15 Source: BUGTRAQ Type: Issue Tracking, Mailing List, Third Party Advisory20041220 MITKRB5-SA-2004-004: heap overflow in libkadm5srv Source: BUGTRAQ Type: Issue Tracking, Mailing List, Third Party Advisory20050110 [USN-58-1] MIT Kerberos server vulnerability Source: CCN Type: RHSA-2005-012krb5 security update Source: CCN Type: RHSA-2005-045krb5 security update Source: CCN Type: MIT Kerberos Web siteKerberos: The Network Authentication Protocol Source: CONFIRM Type: Patch, Vendor Advisoryhttp://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt Source: CCN Type: CIAC Information Bulletin P-075"libkadm5srv" Heap Buffer Overflow Source: CCN Type: CIAC Information Bulletin P-276Apple Security Update 2005-007 Source: DEBIAN Type: DSA-629krb5 -- buffer overflow Source: CCN Type: GLSA-200501-05mit-krb5: Heap overflow in libkadm5srv Source: MANDRAKE Type: Third Party AdvisoryMDKSA-2004:156 Source: REDHAT Type: Third Party AdvisoryRHSA-2005:012 Source: REDHAT Type: Third Party AdvisoryRHSA-2005:045 Source: CCN Type: BID-12059MIT Kerberos 5 Administration Library Add_To_History Heap-Based Buffer Overflow Vulnerability Source: CCN Type: BID-14567Apple Mac OS X Multiple Vulnerabilities Source: TRUSTIX Type: Broken Link2004-0069 Source: CCN Type: TLSA-2005-34A heap overflow vulnerability exists in Kerberos V5 Source: CCN Type: USN-58-1MIT Kerberos server vulnerability Source: XF Type: Third Party Advisory, VDB Entrykerberos-libkadm5srv-bo(18621) Source: XF Type: UNKNOWNkerberos-libkadm5srv-bo(18621) Source: OVAL Type: Broken Link, Third Party Advisoryoval:org.mitre.oval:def:11911 Vulnerable Configuration: Configuration 1 :cpe:/a:mit:kerberos_5:*:*:*:*:*:*:*:* (Version <= 1.3.5)Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:* OR cpe:/a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:* AND cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.mitre.oval:def:11911 V The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow. 2013-04-29 oval:com.redhat.rhsa:def:20050045 P RHSA-2005:045: krb5 security update (Moderate) 2005-02-15 oval:com.redhat.rhsa:def:20050012 P RHSA-2005:012: krb5 security update (Moderate) 2005-01-19 oval:org.debian:def:629 V buffer overflow 2005-01-07
BACK
mit kerberos 5 *
mit kerberos 5-1.3
mit kerberos 5-1.2.2
mit kerberos 5-1.2
mit kerberos 5-1.2.1
mit kerberos 5-1.2.3
mit kerberos 5-1.2.4
mit kerberos 5-1.2.5
mit kerberos 5-1.2.6
mit kerberos 5-1.2.7
mit kerberos 5-1.2.8
mit kerberos 5-1.3.1
mit kerberos 5-1.3.2
mit kerberos 5-1.3.3
mit kerberos 5-1.3.4
mit kerberos 5-1.3.5
debian debian linux 3.0
gentoo linux *
mandrakesoft mandrake linux corporate server 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux 10.0
redhat enterprise linux 3
mandrakesoft mandrake linux 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 10.1
turbolinux turbolinux home *
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1