MIT krb5 Security Advisory 2002-002 [updated] 2002-10-25 [updated; revision history at end] Original Release Date: 2002-10-22 Topic: Buffer overflow in kadmind4 Severity: CRITICAL - Remote user can gain root access to KDC host. SUMMARY ======= A stack buffer overflow in the implementation of the Kerberos v4 compatibility administration daemon (kadmind4) in the MIT krb5 distribution can be exploited to gain unauthorized root access to a KDC host. The attacker does not need to authenticate to the daemon to successfully perform this attack. At least one exploit is known to exist in the wild, and at least one attacker is reasonably competent at cleaning up traces of intrusion. The kadmind4 supplied with MIT krb5 is intended for use in sites that require compatibility with legacy administrative clients; sites that do not have this requirement are not likely to be running this daemon. IMPACT ====== A remote attacker can execute arbitrary code on the KDC with the privileges of the user running kadmind4 (usually root). This can lead to compromise of the Kerberos database.