The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and previous versions, (2) kadmind in KTH Kerberos 4 (eBones) prior to 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) prior to 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote malicious users to execute arbitrary code via a buffer overflow attack.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
kth kth kerberos 4 |
||
kth kth kerberos 5 |
||
mit kerberos 5 |
||
debian debian linux 3.0 |