CVE-2004-0642

Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*

History

02 Feb 2024, 15:27

Type Values Removed Values Added
References (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml - Third Party Advisory (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml - Mailing List, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/11078 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/11078 - Broken Link, Third Party Advisory, VDB Entry
References (CERT) http://www.us-cert.gov/cas/techalerts/TA04-247A.html - Third Party Advisory, US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA04-247A.html - Broken Link, Third Party Advisory, US Government Resource
References (DEBIAN) http://www.debian.org/security/2004/dsa-543 - Third Party Advisory (DEBIAN) http://www.debian.org/security/2004/dsa-543 - Mailing List, Third Party Advisory

Information

Published : 2004-09-28 04:00

Updated : 2024-02-28 10:24


NVD link : CVE-2004-0642

Mitre link : CVE-2004-0642

CVE.ORG link : CVE-2004-0642


JSON object : View

Products Affected

redhat

  • enterprise_linux_desktop
  • enterprise_linux_server
  • enterprise_linux_workstation

mit

  • kerberos_5

debian

  • debian_linux
CWE
CWE-415

Double Free