KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kerberos_5 | Mit | * | 1.6.3 (including) |
Red Hat Enterprise Linux 2.1 | RedHat | krb5-0:1.2.2-48 | * |
Red Hat Enterprise Linux 3 | RedHat | krb5-0:1.2.7-68 | * |
Red Hat Enterprise Linux 4 | RedHat | krb5-0:1.3.4-54.el4_6.1 | * |
Red Hat Enterprise Linux 4.5 Z Stream | RedHat | krb5-0:1.3.4-49.el4_5.1 | * |
Red Hat Enterprise Linux 5 | RedHat | krb5-0:1.6.1-17.el5_1.1 | * |
Krb5 | Ubuntu | dapper | * |
Krb5 | Ubuntu | devel | * |
Krb5 | Ubuntu | edgy | * |
Krb5 | Ubuntu | feisty | * |
Krb5 | Ubuntu | gutsy | * |
Krb5 | Ubuntu | upstream | * |