10
CVSSv2

CVE-2004-0523

Published: 18/08/2004 Updated: 21/01/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and previous versions allow remote malicious users to execute arbitrary code as root.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5 1.2

mit kerberos 5 1.2.1

mit kerberos 5 1.2.2

mit kerberos 5 1.3

mit kerberos 5 1.0

sgi propack 2.4

mit kerberos 1.0

mit kerberos 1.0.8

mit kerberos 5 1.2.5

mit kerberos 5 1.2.6

mit kerberos 5 1.1.1

sun seam 1.0.2

tinysofa tinysofa enterprise server 1.0

mit kerberos 1.2.2.beta1

mit kerberos 5 1.1

mit kerberos 5 1.2.7

mit kerberos 5 1.3.3

tinysofa tinysofa enterprise server 1.0_u1

sgi propack 3.0

mit kerberos 5 1.2.3

mit kerberos 5 1.2.4

mit kerberos 5 1.0.6

sun seam 1.0

sun seam 1.0.1

sun sunos 5.8

sun solaris 8.0

sun solaris 9.0

Vendor Advisories

Synopsis krb5 security update Type/Severity Security Advisory: Moderate Topic Updated Kerberos 5 (krb5) packages which correct buffer overflows in thekrb5_aname_to_localname function are now available Description Kerberos is a network authentication systemBugs have been fixed in the krb5_ ...
In their advisory MITKRB5-SA-2004-001, the MIT Kerberos announced the existence of buffer overflow vulnerabilities in the krb5_aname_to_localname function This function is only used if aname_to_localname is enabled in the configuration (this is not enabled by default) For the current stable distribution (woody), this problem has been fixed in ver ...