Bug 143443 - CAN-2004-1189 heap buffer overflow in password history mechanism [MITKRB5-SA-2004-004]
Summary: CAN-2004-1189 heap buffer overflow in password history mechanism [MITKRB5-SA-...
Keywords:
Status: CLOSED DUPLICATE of bug 142904
Alias: None
Product: Fedora
Classification: Fedora
Component: krb5
Version: rawhide
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nalin Dahyabhai
QA Contact: Brian Brock
URL: http://web.mit.edu/kerberos/www/advis...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-12-20 23:06 UTC by Marcin Garski
Modified: 2007-11-30 22:10 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2006-02-21 19:07:45 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Marcin Garski 2004-12-20 23:06:07 UTC
Probably also affect RHEL!

From Security Advisory:
The MIT Kerberos 5 administration library (libkadm5srv) contains a
heap buffer overflow in password history handling code which could be
exploited to execute arbitrary code on a Key Distribution Center (KDC)
host.  The overflow occurs during a password change of a principal
with a certain password history state.  An administrator must have
performed a certain password policy change in order to create the
vulnerable state.

An authenticated user, not necessarily one with administrative
privileges, could execute arbitrary code on the KDC host, compromising
an entire Kerberos realm.

Comment 1 Josh Bressers 2004-12-21 13:12:56 UTC

*** This bug has been marked as a duplicate of 142904 ***

Comment 2 Red Hat Bugzilla 2006-02-21 19:07:45 UTC
Changed to 'CLOSED' state since 'RESOLVED' has been deprecated.


Note You need to log in before you can comment on or make changes to this bug.