Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an an invalid direction encoding.
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kerberos_5 | Mit | * | 1.6.1 (excluding) |
Red Hat Enterprise Linux 2.1 | RedHat | krb5-0:1.2.2-44 | * |
Red Hat Enterprise Linux 3 | RedHat | krb5-0:1.2.7-61 | * |
Red Hat Enterprise Linux 4 | RedHat | krb5-0:1.3.4-46 | * |
Red Hat Enterprise Linux 5 | RedHat | krb5-0:1.5-23 | * |
Krb5 | Ubuntu | dapper | * |
Krb5 | Ubuntu | devel | * |
Krb5 | Ubuntu | edgy | * |
Krb5 | Ubuntu | feisty | * |