First published: Sun Jul 17 2005(Updated: )
Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application | <=1.4.1 | |
Apple iOS and macOS | <10.4.2 | |
Apple macOS Server | <10.4.2 | |
Debian | =3.0 | |
Debian | =3.1 | |
MIT Kerberos 5 Application | =1.3 | |
MIT Kerberos 5 Application | =1.3.1 | |
MIT Kerberos 5 Application | =1.3.2 | |
MIT Kerberos 5 Application | =1.3.3 | |
MIT Kerberos 5 Application | =1.3.4 | |
MIT Kerberos 5 Application | =1.3.5 | |
MIT Kerberos 5 Application | =1.3.6 | |
MIT Kerberos 5 Application | =1.4 | |
MIT Kerberos 5 Application | =1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1689 is classified as a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2005-1689, upgrade to MIT Kerberos 5 version 1.4.2 or later.
CVE-2005-1689 affects MIT Kerberos 5 versions up to and including 1.4.1.
The impact of CVE-2005-1689 includes the possibility of remote code execution, compromising the integrity and confidentiality of the system.
CVE-2005-1689 affects multiple operating systems using vulnerable versions of MIT Kerberos 5, including Debian and macOS.