Kerberos Kadmind Null Pointer Dereference in process_db_args() Lets Remote Authenticated Users Execute Arbitrary Code on the Target System
|
SecurityTracker Alert ID: 1035399 |
SecurityTracker URL: http://securitytracker.com/id/1035399
|
CVE Reference:
CVE-2016-3119
(Links to External Site)
|
Date: Mar 24 2016
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in Kerberos. A remote authenticated user can execute arbitrary code on the target system.
A remote authenticated user can send a specially crafted modify_principal command with an empty DB argument to trigger a null pointer dereference in process_db_args() and execute arbitrary code on the target system.
Systems configured to use the LDAP Kerberos data interface module are affected.
|
Impact:
A remote authenticated user can execute arbitrary code on the target system.
|
Solution:
The vendor has issued a source code fix, available at:
https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
|
Vendor URL: web.mit.edu/kerberos/ (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|