Korean
<< Back
VID 14007
Severity 40
Port 543
Protocol TCP
Class KERBEROS
Detailed Description Serious buffer overrun vulnerabilities exist in many implementations of Kerberos 4, including implementations included for backwards compatibility in Kerberos 5 implementations. Other less serious buffer overrun vulnerabilities have also been discovered. ALL KNOWN KERBEROS 4 IMPLEMENTATIONS derived from MIT sources are believed to be vulnerable.

< IMPACT >
- A remote user may gain unauthorized root access to a machine running services authenticated with Kerberos 4.
- A remote user may gain unauthorized root access to a machine running krshd, regardless of whether the program is configured to accept Kerberos 4 authentication.
- A local user may gain unauthorized root access by exploiting v4rcp or ksu.

* References:
http://www.cert.org/advisories/CA-2000-06.html
http://www.securiteam.com/exploits/5EP000A1QU.html
http://www.iss.net/security_center/static/5734.php
Recommendation Upgrade to release krb5-1.2 or newer from MIT, or patch.

< Patches >
http://www.cert.org/advisories/CA-2000-06/mit_10x_patch.txt
http://www.cert.org/advisories/CA-2000-06/mit_111_patch.txt
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)