CVE-2011-0284

Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://osvdb.org/71183
http://secunia.com/advisories/43700
http://secunia.com/advisories/43760
http://secunia.com/advisories/43783 Vendor Advisory
http://secunia.com/advisories/43881
http://securitytracker.com/id?1025216
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/943220 Patch US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2011:048
http://www.redhat.com/support/errata/RHSA-2011-0356.html
http://www.securityfocus.com/archive/1/517029/100/0/threaded
http://www.securityfocus.com/bid/46881
http://www.ubuntu.com/usn/USN-1088-1
http://www.vupen.com/english/advisories/2011/0672 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0673 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0680
http://www.vupen.com/english/advisories/2011/0722
http://www.vupen.com/english/advisories/2011/0763
https://exchange.xforce.ibmcloud.com/vulnerabilities/66101
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://osvdb.org/71183
http://secunia.com/advisories/43700
http://secunia.com/advisories/43760
http://secunia.com/advisories/43783 Vendor Advisory
http://secunia.com/advisories/43881
http://securitytracker.com/id?1025216
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/943220 Patch US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2011:048
http://www.redhat.com/support/errata/RHSA-2011-0356.html
http://www.securityfocus.com/archive/1/517029/100/0/threaded
http://www.securityfocus.com/bid/46881
http://www.ubuntu.com/usn/USN-1088-1
http://www.vupen.com/english/advisories/2011/0672 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0673 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0680
http://www.vupen.com/english/advisories/2011/0722
http://www.vupen.com/english/advisories/2011/0763
https://exchange.xforce.ibmcloud.com/vulnerabilities/66101
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*

History

21 Nov 2024, 01:23

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html -
References () http://osvdb.org/71183 - () http://osvdb.org/71183 -
References () http://secunia.com/advisories/43700 - () http://secunia.com/advisories/43700 -
References () http://secunia.com/advisories/43760 - () http://secunia.com/advisories/43760 -
References () http://secunia.com/advisories/43783 - Vendor Advisory () http://secunia.com/advisories/43783 - Vendor Advisory
References () http://secunia.com/advisories/43881 - () http://secunia.com/advisories/43881 -
References () http://securitytracker.com/id?1025216 - () http://securitytracker.com/id?1025216 -
References () http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt - Vendor Advisory, Patch () http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/943220 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/943220 - Patch, US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:048 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:048 -
References () http://www.redhat.com/support/errata/RHSA-2011-0356.html - () http://www.redhat.com/support/errata/RHSA-2011-0356.html -
References () http://www.securityfocus.com/archive/1/517029/100/0/threaded - () http://www.securityfocus.com/archive/1/517029/100/0/threaded -
References () http://www.securityfocus.com/bid/46881 - () http://www.securityfocus.com/bid/46881 -
References () http://www.ubuntu.com/usn/USN-1088-1 - () http://www.ubuntu.com/usn/USN-1088-1 -
References () http://www.vupen.com/english/advisories/2011/0672 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0672 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0673 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0673 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0680 - () http://www.vupen.com/english/advisories/2011/0680 -
References () http://www.vupen.com/english/advisories/2011/0722 - () http://www.vupen.com/english/advisories/2011/0722 -
References () http://www.vupen.com/english/advisories/2011/0763 - () http://www.vupen.com/english/advisories/2011/0763 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/66101 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/66101 -

Information

Published : 2011-03-20 02:00

Updated : 2024-11-21 01:23


NVD link : CVE-2011-0284

Mitre link : CVE-2011-0284

CVE.ORG link : CVE-2011-0284


JSON object : View

Products Affected

mit

  • kerberos_5
CWE
CWE-399

Resource Management Errors