Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 161258 - mit-krb5: kadmind (via RPC library) calls uninitialized function pointer
Summary: mit-krb5: kadmind (via RPC library) calls uninitialized function pointer
Status: RESOLVED DUPLICATE of bug 158810
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High critical (vote)
Assignee: Gentoo Security
URL: http://web.mit.edu/kerberos/www/advis...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2007-01-10 02:32 UTC by Paul B. Henson
Modified: 2007-01-10 04:50 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Paul B. Henson 2007-01-10 02:32:18 UTC
MIT krb5 Security Advisory 2006-002

Original release: 2007-01-09
Last update: 2007-01-09

Topic: kadmind (via RPC library) calls uninitialized function pointer

Severity: CRITICAL

CVE: CVE-2006-6143
CERT: VU#481564

SUMMARY
=======

The Kerberos administration daemon, "kadmind", can execute arbitrary
code by calling through a function pointer located in freed memory.
This vulnerability results from bugs in the server-side portion of the
RPC library.  Third-party server applications written using the RPC
library provided with MIT krb5 may also be vulnerable.

No exploit code is known to exist at this time.


Reproducible: Always
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-01-10 04:50:34 UTC
Thx for the report Paul, however we already have a restricted bug for this that I'll open now.

*** This bug has been marked as a duplicate of bug 158810 ***