CVE Vulnerabilities

CVE-2008-0062

Improper Initialization

Published: Mar 19, 2008 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
LOW

KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.

Weakness

The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.

Affected Software

Name Vendor Start Version End Version
Kerberos_5 Mit * 1.6.3 (including)
Red Hat Enterprise Linux 2.1 RedHat krb5-0:1.2.2-48 *
Red Hat Enterprise Linux 3 RedHat krb5-0:1.2.7-68 *
Red Hat Enterprise Linux 4 RedHat krb5-0:1.3.4-54.el4_6.1 *
Red Hat Enterprise Linux 4.5 Z Stream RedHat krb5-0:1.3.4-49.el4_5.1 *
Red Hat Enterprise Linux 5 RedHat krb5-0:1.6.1-17.el5_1.1 *
Krb5 Ubuntu dapper *
Krb5 Ubuntu devel *
Krb5 Ubuntu edgy *
Krb5 Ubuntu feisty *
Krb5 Ubuntu gutsy *
Krb5 Ubuntu upstream *

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, in Java, if the programmer does not explicitly initialize a variable, then the code could produce a compile-time error (if the variable is local) or automatically initialize the variable to the default value for the variable’s type. In Perl, if explicit initialization is not performed, then a default value of undef is assigned, which is interpreted as 0, false, or an equivalent value depending on the context in which the variable is accessed.

References