First published: Fri Apr 15 2011(Updated: )
The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application | =1.7 | |
MIT Kerberos 5 Application | =1.7.1 | |
MIT Kerberos 5 Application | =1.8 | |
MIT Kerberos 5 Application | =1.8.1 | |
MIT Kerberos 5 Application | =1.8.2 | |
MIT Kerberos 5 Application | =1.8.3 | |
MIT Kerberos 5 Application | =1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0285 is considered a critical vulnerability due to its potential for arbitrary code execution and denial of service.
To fix CVE-2011-0285, you should upgrade to a patched version of MIT Kerberos 5, specifically versions later than 1.9.
CVE-2011-0285 affects MIT Kerberos 5 versions 1.7 through 1.9.
Yes, CVE-2011-0285 can be exploited remotely by sending crafted requests that trigger the vulnerability.
If exploited, CVE-2011-0285 can lead to arbitrary code execution or a crash of the kadmind daemon.