SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Kerberos Vendors:   Novell
(Novell Issues Fix for Novell KDC) Kerberos kadmind RPC Library Bugs May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1018387
SecurityTracker URL:  http://securitytracker.com/id/1018387
CVE Reference:   CVE-2007-2442, CVE-2007-2443   (Links to External Site)
Date:  Jul 13 2007
Impact:   Denial of service via network, Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Novell KDC 1.0.2 and prior versions
Description:   A vulnerability was reported in Kerberos. A remote user may be able to execute arbitrary code on the target system. Novell KDC is affected.

A remote user can send specially crafted data to cause the gssrpc__svcauth_gssapi() function in 'src/lib/rpc/svc_auth_gssapi.c' to attempt to free an uninitialized 'creds' parameter [CVE-2007-2442]. This may allow the remote user to execute arbitrary code on the target system with the privileges of the target service (root privileges), or to crash the target service.

A remote user can send specially crafted data to cause the gssrpc__svcauth_unix() function in 'src/lib/rpc/svc_auth_unix.c' to potentially execute arbitrary code.

MIT credits Wei Wang of McAfee Avert Labs with discovering these vulnerabilities.

Impact:   A remote user may be able to execute arbitrary code on the target system.

A remote user can cause denial of service conditions.

Solution:   Novell has issued a fix for Novell KDC (1.0.3), available at:

http://download.novell.com

The Novell advisory is available at:

https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html

Vendor URL:  web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt (Links to External Site)
Cause:   Boundary error

Message History:   This archive entry is a follow-up to the message listed below.
Jun 26 2007 Kerberos kadmind RPC Library Bugs May Let Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC