7.2
CVSSv2

CVE-2004-1189

Published: 31/12/2004 Updated: 02/02/2021
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5

Vendor Advisories

Michael Tautschnig discovered a possible buffer overflow in the add_to_history() function in the MIT Kerberos 5 implementation Performing a password change did not properly track the password policy’s history count and the maximum number of keys This could cause an array overflow and may have allowed authenticated users (not necessarily one wit ...
Synopsis krb5 security update Type/Severity Security Advisory: Moderate Topic Updated Kerberos (krb5) packages that correct buffer overflow and temporaryfile bugs are now available for Red Hat Enterprise Linux Description Kerberos is a networked authentication system that uses a trusted th ...
Synopsis krb5 security update Type/Severity Security Advisory: Moderate Topic Updated Kerberos (krb5) packages that correct a buffer overflow bug are nowavailable for Red Hat Enterprise Linux 4This update has been rated as having moderate security impact by the Red HatSecurity Response Team Descr ...