668
VMScore

CVE-2005-1689

Published: 18/07/2005 Updated: 02/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and previous versions allows remote malicious users to execute arbitrary code via certain error conditions.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5

apple mac os x server

apple mac os x

debian debian linux 3.1

debian debian linux 3.0

Vendor Advisories

Ga�l Delalleau discovered a buffer overflow in the env_opt_add() function of the Kerberos 4 and 5 telnet clients By sending specially crafted replies, a malicious telnet server could exploit this to execute arbitrary code with the privileges of the user running the telnet client (CVE-2005-0468) ...
Synopsis krb5 security update Type/Severity Security Advisory: Important Topic Updated krb5 packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Security Response Team Description ...
Synopsis krb5 security update Type/Severity Security Advisory: Critical Topic Updated krb5 packages which fix multiple security issues are now availablefor Red Hat Enterprise Linux 21 and 3This update has been rated as having critical security impact by the RedHat Security Response Team[Updated 26 Sep 20 ...
Daniel Wachdorf reported two problems in the MIT krb5 distribution used for network authentication First, the KDC program from the krb5-kdc package can corrupt the heap by trying to free memory which has already been freed on receipt of a certain TCP connection This vulnerability can cause the KDC to crash, leading to a denial of service [CAN-20 ...

References

CWE-415http://www.debian.org/security/2005/dsa-757http://www.gentoo.org/security/en/glsa/glsa-200507-11.xmlhttp://www.kb.cert.org/vuls/id/623332http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlhttp://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlhttp://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-003-recvauth.txtftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.aschttp://www.novell.com/linux/security/advisories/2005_17_sr.htmlhttp://www.turbolinux.com/security/2005/TLSA-2005-78.txthttp://www.trustix.org/errata/2005/0036http://www.securityfocus.com/bid/14239http://secunia.com/advisories/16041http://secunia.com/advisories/17899http://securitytracker.com/id?1014461http://www.redhat.com/support/errata/RHSA-2005-562.htmlhttp://www.redhat.com/support/errata/RHSA-2005-567.htmlhttp://secunia.com/advisories/17135http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000993http://sunsolve.sun.com/search/document.do?assetkey=1-26-101810-1http://secunia.com/advisories/22090http://www.vupen.com/english/advisories/2005/1066http://www.vupen.com/english/advisories/2006/3776http://marc.info/?l=bugtraq&m=112119974704542&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/21055https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9819https://usn.ubuntu.com/224-1/http://www.securityfocus.com/archive/1/446940/100/0/threadedhttps://usn.ubuntu.com/224-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/623332