Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code.
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kerberos_5 | Mit | * | 1.3.3 (including) |
Red Hat Enterprise Linux 3 | RedHat | krb5-0:1.2.7-28 | * |
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
Red Hat Enterprise Linux ES version 2.1 | RedHat | * | |
Red Hat Enterprise Linux WS version 2.1 | RedHat | * | |
Red Hat Linux Advanced Workstation 2.1 | RedHat | * | |
Krb5 | Ubuntu | dapper | * |
Krb5 | Ubuntu | devel | * |
Krb5 | Ubuntu | edgy | * |
Krb5 | Ubuntu | feisty | * |