First published: Wed Mar 19 2008(Updated: )
Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application | =1.6.3 | |
MIT Kerberos 5 Application | =1.4 | |
MIT Kerberos 5 Application | =1.4.1 | |
MIT Kerberos 5 Application | =1.4.2 | |
MIT Kerberos 5 Application | =1.4.3 | |
MIT Kerberos 5 Application | =1.4.4 | |
MIT Kerberos 5 Application | =1.5 | |
MIT Kerberos 5 Application | =1.5.1 | |
MIT Kerberos 5 Application | =1.5.2 | |
MIT Kerberos 5 Application | =1.5.3 | |
MIT Kerberos 5 Application | =1.6 | |
MIT Kerberos 5 Application | =1.6.1 | |
MIT Kerberos 5 Application | =1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0947 is considered a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2008-0947, upgrade your MIT Kerberos 5 installation to version 1.6.4 or later.
CVE-2008-0947 affects MIT Kerberos 5 versions 1.4 through 1.6.3.
Yes, CVE-2008-0947 can be exploited remotely by attackers triggering a large number of open file descriptors.
The impact of CVE-2008-0947 includes potential arbitrary code execution, leading to unauthorized access or control of the affected system.