CVE-2006-6144

The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.
References
Link Resource
http://fedoranews.org/cms/node/2375 Broken Link
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html Broken Link
http://osvdb.org/31280 Broken Link
http://secunia.com/advisories/23690 Third Party Advisory
http://secunia.com/advisories/23701 Third Party Advisory
http://secunia.com/advisories/23706 Third Party Advisory
http://secunia.com/advisories/23903 Third Party Advisory
http://secunia.com/advisories/35151 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200701-21.xml Third Party Advisory
http://securitytracker.com/id?1017494 Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1 Broken Link
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/831452 Third Party Advisory US Government Resource
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html Third Party Advisory
http://www.securityfocus.com/archive/1/456409/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/21975 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-009B.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/0111 Third Party Advisory
http://www.vupen.com/english/advisories/2007/0112 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/31417 Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-925 Broken Link
http://fedoranews.org/cms/node/2375 Broken Link
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html Broken Link
http://osvdb.org/31280 Broken Link
http://secunia.com/advisories/23690 Third Party Advisory
http://secunia.com/advisories/23701 Third Party Advisory
http://secunia.com/advisories/23706 Third Party Advisory
http://secunia.com/advisories/23903 Third Party Advisory
http://secunia.com/advisories/35151 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200701-21.xml Third Party Advisory
http://securitytracker.com/id?1017494 Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1 Broken Link
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/831452 Third Party Advisory US Government Resource
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html Third Party Advisory
http://www.securityfocus.com/archive/1/456409/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/21975 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-009B.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/0111 Third Party Advisory
http://www.vupen.com/english/advisories/2007/0112 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/31417 Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-925 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:21

Type Values Removed Values Added
References () http://fedoranews.org/cms/node/2375 - Broken Link () http://fedoranews.org/cms/node/2375 - Broken Link
References () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html - Broken Link () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html - Broken Link
References () http://osvdb.org/31280 - Broken Link () http://osvdb.org/31280 - Broken Link
References () http://secunia.com/advisories/23690 - Third Party Advisory () http://secunia.com/advisories/23690 - Third Party Advisory
References () http://secunia.com/advisories/23701 - Third Party Advisory () http://secunia.com/advisories/23701 - Third Party Advisory
References () http://secunia.com/advisories/23706 - Third Party Advisory () http://secunia.com/advisories/23706 - Third Party Advisory
References () http://secunia.com/advisories/23903 - Third Party Advisory () http://secunia.com/advisories/23903 - Third Party Advisory
References () http://secunia.com/advisories/35151 - Third Party Advisory () http://secunia.com/advisories/35151 - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-200701-21.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200701-21.xml - Third Party Advisory
References () http://securitytracker.com/id?1017494 - Third Party Advisory, VDB Entry () http://securitytracker.com/id?1017494 - Third Party Advisory, VDB Entry
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1 - Broken Link () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1 - Broken Link
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1 - Broken Link () http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1 - Broken Link
References () http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt - Patch, Vendor Advisory () http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/831452 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/831452 - Third Party Advisory, US Government Resource
References () http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html - Third Party Advisory () http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html - Third Party Advisory
References () http://www.securityfocus.com/archive/1/456409/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/456409/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/21975 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/21975 - Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA07-009B.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-009B.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2007/0111 - Third Party Advisory () http://www.vupen.com/english/advisories/2007/0111 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2007/0112 - Third Party Advisory () http://www.vupen.com/english/advisories/2007/0112 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/31417 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/31417 - Third Party Advisory, VDB Entry
References () https://issues.rpath.com/browse/RPL-925 - Broken Link () https://issues.rpath.com/browse/RPL-925 - Broken Link

Information

Published : 2006-12-31 05:00

Updated : 2024-11-21 00:21


NVD link : CVE-2006-6144

Mitre link : CVE-2006-6144

CVE.ORG link : CVE-2006-6144


JSON object : View

Products Affected

mit

  • kerberos_5