Vulnerability Name: | CVE-2004-1189 (CCN-18621) |
Assigned: | 2004-12-20 |
Published: | 2004-12-20 |
Updated: | 2021-02-02 |
Summary: | The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow. |
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-787
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: BugTraq Mailing List, Mon Dec 20 2004 - 16:58:43 CST MITKRB5-SA-2004-004: heap overflow in libkadm5srv
Source: CCN Type: Sun Alert ID: 57712 Security Vulnerability in Kerberos 5 Administration Library for Solaris/SEAM
Source: MITRE Type: CNA CVE-2004-1189
Source: CONECTIVA Type: Broken Link CLA-2005:917
Source: APPLE Type: Mailing List, Third Party Advisory APPLE-SA-2005-08-17
Source: APPLE Type: Mailing List, Third Party Advisory APPLE-SA-2005-08-15
Source: BUGTRAQ Type: Issue Tracking, Mailing List, Third Party Advisory 20041220 MITKRB5-SA-2004-004: heap overflow in libkadm5srv
Source: BUGTRAQ Type: Issue Tracking, Mailing List, Third Party Advisory 20050110 [USN-58-1] MIT Kerberos server vulnerability
Source: CCN Type: RHSA-2005-012 krb5 security update
Source: CCN Type: RHSA-2005-045 krb5 security update
Source: CCN Type: MIT Kerberos Web site Kerberos: The Network Authentication Protocol
Source: CONFIRM Type: Patch, Vendor Advisory http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt
Source: CCN Type: CIAC Information Bulletin P-075 "libkadm5srv" Heap Buffer Overflow
Source: CCN Type: CIAC Information Bulletin P-276 Apple Security Update 2005-007
Source: DEBIAN Type: DSA-629 krb5 -- buffer overflow
Source: CCN Type: GLSA-200501-05 mit-krb5: Heap overflow in libkadm5srv
Source: MANDRAKE Type: Third Party Advisory MDKSA-2004:156
Source: REDHAT Type: Third Party Advisory RHSA-2005:012
Source: REDHAT Type: Third Party Advisory RHSA-2005:045
Source: CCN Type: BID-12059 MIT Kerberos 5 Administration Library Add_To_History Heap-Based Buffer Overflow Vulnerability
Source: CCN Type: BID-14567 Apple Mac OS X Multiple Vulnerabilities
Source: TRUSTIX Type: Broken Link 2004-0069
Source: CCN Type: TLSA-2005-34 A heap overflow vulnerability exists in Kerberos V5
Source: CCN Type: USN-58-1 MIT Kerberos server vulnerability
Source: XF Type: Third Party Advisory, VDB Entry kerberos-libkadm5srv-bo(18621)
Source: XF Type: UNKNOWN kerberos-libkadm5srv-bo(18621)
Source: OVAL Type: Broken Link, Third Party Advisory oval:org.mitre.oval:def:11911
|
Vulnerable Configuration: | Configuration 1: cpe:/a:mit:kerberos_5:*:*:*:*:*:*:*:* (Version <= 1.3.5) Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:mit:kerberos_5:1.3:-:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2:-:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*OR cpe:/a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*AND cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.mitre.oval:def:11911 | V | The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow. | 2013-04-29 | oval:com.redhat.rhsa:def:20050045 | P | RHSA-2005:045: krb5 security update (Moderate) | 2005-02-15 | oval:com.redhat.rhsa:def:20050012 | P | RHSA-2005:012: krb5 security update (Moderate) | 2005-01-19 | oval:org.debian:def:629 | V | buffer overflow | 2005-01-07 |
|
BACK |
mit kerberos 5 *
mit kerberos 5-1.3
mit kerberos 5-1.2.2
mit kerberos 5-1.2
mit kerberos 5-1.2.1
mit kerberos 5-1.2.3
mit kerberos 5-1.2.4
mit kerberos 5-1.2.5
mit kerberos 5-1.2.6
mit kerberos 5-1.2.7
mit kerberos 5-1.2.8
mit kerberos 5-1.3.1
mit kerberos 5-1.3.2
mit kerberos 5-1.3.3
mit kerberos 5-1.3.4
mit kerberos 5-1.3.5
debian debian linux 3.0
gentoo linux *
mandrakesoft mandrake linux corporate server 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux 10.0
redhat enterprise linux 3
mandrakesoft mandrake linux 10.1
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 10.1
turbolinux turbolinux home *
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1