CVE-2005-1175

Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://marc.info/?l=bugtraq&m=112122123211974&w=2
http://secunia.com/advisories/16041
http://secunia.com/advisories/17135
http://secunia.com/advisories/17899
http://secunia.com/advisories/20364
http://securitytracker.com/id?1014460
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt Patch Vendor Advisory
http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474
http://www.debian.org/security/2005/dsa-757 Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/885830 Patch Third Party Advisory US Government Resource
http://www.novell.com/linux/security/advisories/2005_17_sr.html
http://www.redhat.com/support/errata/RHSA-2005-562.html
http://www.redhat.com/support/errata/RHSA-2005-567.html
http://www.securityfocus.com/bid/14236
http://www.trustix.org/errata/2005/0036
http://www.turbolinux.com/security/2005/TLSA-2005-78.txt
http://www.vupen.com/english/advisories/2005/1066
http://www.vupen.com/english/advisories/2006/2074
https://exchange.xforce.ibmcloud.com/vulnerabilities/21328
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902
https://usn.ubuntu.com/224-1/
ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://marc.info/?l=bugtraq&m=112122123211974&w=2
http://secunia.com/advisories/16041
http://secunia.com/advisories/17135
http://secunia.com/advisories/17899
http://secunia.com/advisories/20364
http://securitytracker.com/id?1014460
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt Patch Vendor Advisory
http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474
http://www.debian.org/security/2005/dsa-757 Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/885830 Patch Third Party Advisory US Government Resource
http://www.novell.com/linux/security/advisories/2005_17_sr.html
http://www.redhat.com/support/errata/RHSA-2005-562.html
http://www.redhat.com/support/errata/RHSA-2005-567.html
http://www.securityfocus.com/bid/14236
http://www.trustix.org/errata/2005/0036
http://www.turbolinux.com/security/2005/TLSA-2005-78.txt
http://www.vupen.com/english/advisories/2005/1066
http://www.vupen.com/english/advisories/2006/2074
https://exchange.xforce.ibmcloud.com/vulnerabilities/21328
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902
https://usn.ubuntu.com/224-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:56

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc - () ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc -
References () http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html - () http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html -
References () http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html - () http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html -
References () http://marc.info/?l=bugtraq&m=112122123211974&w=2 - () http://marc.info/?l=bugtraq&m=112122123211974&w=2 -
References () http://secunia.com/advisories/16041 - () http://secunia.com/advisories/16041 -
References () http://secunia.com/advisories/17135 - () http://secunia.com/advisories/17135 -
References () http://secunia.com/advisories/17899 - () http://secunia.com/advisories/17899 -
References () http://secunia.com/advisories/20364 - () http://secunia.com/advisories/20364 -
References () http://securitytracker.com/id?1014460 - () http://securitytracker.com/id?1014460 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101809-1 -
References () http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt - Patch, Vendor Advisory () http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-002-kdc.txt - Patch, Vendor Advisory
References () http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474 - () http://www-1.ibm.com/support/docview.wss?uid=swg1IY85474 -
References () http://www.debian.org/security/2005/dsa-757 - Patch, Vendor Advisory () http://www.debian.org/security/2005/dsa-757 - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/885830 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/885830 - Patch, Third Party Advisory, US Government Resource
References () http://www.novell.com/linux/security/advisories/2005_17_sr.html - () http://www.novell.com/linux/security/advisories/2005_17_sr.html -
References () http://www.redhat.com/support/errata/RHSA-2005-562.html - () http://www.redhat.com/support/errata/RHSA-2005-562.html -
References () http://www.redhat.com/support/errata/RHSA-2005-567.html - () http://www.redhat.com/support/errata/RHSA-2005-567.html -
References () http://www.securityfocus.com/bid/14236 - () http://www.securityfocus.com/bid/14236 -
References () http://www.trustix.org/errata/2005/0036 - () http://www.trustix.org/errata/2005/0036 -
References () http://www.turbolinux.com/security/2005/TLSA-2005-78.txt - () http://www.turbolinux.com/security/2005/TLSA-2005-78.txt -
References () http://www.vupen.com/english/advisories/2005/1066 - () http://www.vupen.com/english/advisories/2005/1066 -
References () http://www.vupen.com/english/advisories/2006/2074 - () http://www.vupen.com/english/advisories/2006/2074 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/21328 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/21328 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A736 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9902 -
References () https://usn.ubuntu.com/224-1/ - () https://usn.ubuntu.com/224-1/ -

Information

Published : 2005-07-18 04:00

Updated : 2024-11-20 23:56


NVD link : CVE-2005-1175

Mitre link : CVE-2005-1175

CVE.ORG link : CVE-2005-1175


JSON object : View

Products Affected

mit

  • kerberos_5