First published: Fri Oct 25 2002(Updated: )
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kerberos | >=1.0<=1.2.6 | |
KTH Kerberos | <1.2.1 | |
MIT Kerberos 5 | <0.5.1 | |
Debian | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1235 is classified as a high severity vulnerability that allows for potential unauthorized access.
To fix CVE-2002-1235, upgrade to the latest versions of affected software including MIT Kerberos 5 versions above 1.2.6 and KTH Kerberos versions above 1.2.1.
CVE-2002-1235 affects systems using MIT Kerberos 5 versions up to 1.2.6 and KTH Kerberos versions up to 1.2.1 or 0.5.1 when compiled with Kerberos 4 support.
The impact of CVE-2002-1235 includes potential unauthorized access and manipulation of accounts due to inadequate security in the kadm_ser_in function.
Debian 3.0 is affected by CVE-2002-1235 due to its inclusion of vulnerable versions of the Kerberos software.