First published: Sun Dec 31 2006(Updated: )
The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | =1.4 | |
MIT Kerberos 5 | =1.4.1 | |
MIT Kerberos 5 | =1.4.2 | |
MIT Kerberos 5 | =1.4.3 | |
MIT Kerberos 5 | =1.4.4 | |
MIT Kerberos 5 | =1.5 | |
MIT Kerberos 5 | =1.5.1 | |
Canonical Ubuntu Linux | =6.06 | |
Canonical Ubuntu Linux | =6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.