CVE-2004-0434

k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc - Broken Link, Third Party Advisory () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc - Broken Link, Third Party Advisory
References () http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html - Broken Link, Third Party Advisory () http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html - Broken Link, Third Party Advisory
References () http://marc.info/?l=bugtraq&m=108386148126457&w=2 - Mailing List () http://marc.info/?l=bugtraq&m=108386148126457&w=2 - Mailing List
References () http://security.gentoo.org/glsa/glsa-200405-23.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200405-23.xml - Third Party Advisory
References () http://www.debian.org/security/2004/dsa-504 - Broken Link, Patch, Third Party Advisory () http://www.debian.org/security/2004/dsa-504 - Broken Link, Patch, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16071 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/16071 - Third Party Advisory, VDB Entry

02 Feb 2024, 03:05

Type Values Removed Values Added
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8
CWE CWE-787 CWE-131
References (FREEBSD) ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc - Third Party Advisory (FREEBSD) ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc - Broken Link, Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2004/dsa-504 - Patch, Third Party Advisory (DEBIAN) http://www.debian.org/security/2004/dsa-504 - Broken Link, Patch, Third Party Advisory
References (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html - Third Party Advisory (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html - Broken Link, Third Party Advisory

Information

Published : 2004-07-07 04:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0434

Mitre link : CVE-2004-0434

CVE.ORG link : CVE-2004-0434


JSON object : View

Products Affected

debian

  • debian_linux

heimdal_project

  • heimdal
CWE
CWE-131

Incorrect Calculation of Buffer Size