First published: Sun Jul 17 2005(Updated: )
Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | =1.3 | |
MIT Kerberos 5 | =1.3.1 | |
MIT Kerberos 5 | =1.3.2 | |
MIT Kerberos 5 | =1.3.3 | |
MIT Kerberos 5 | =1.3.4 | |
MIT Kerberos 5 | =1.3.5 | |
MIT Kerberos 5 | =1.3.6 | |
MIT Kerberos 5 | =1.4 | |
MIT Kerberos 5 | =1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1175 is classified as a critical severity vulnerability due to its potential for remote code execution and denial of service.
To fix CVE-2005-1175, upgrade MIT Kerberos 5 to version 1.4.2 or later.
CVE-2005-1175 can lead to denial of service or allow attackers to execute arbitrary code on the affected system.
CVE-2005-1175 affects MIT Kerberos 5 versions 1.3 to 1.4.1.
Yes, CVE-2005-1175 can be exploited remotely through valid TCP or UDP requests.