CVE-2004-0642

Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*

History

02 Feb 2024, 15:27

Type Values Removed Values Added
References () http://www.debian.org/security/2004/dsa-543 - Third Party Advisory () http://www.debian.org/security/2004/dsa-543 - Mailing List, Third Party Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml - Third Party Advisory () http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/11078 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/11078 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA04-247A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-247A.html - Broken Link, Third Party Advisory, US Government Resource

02 Feb 2021, 18:05

Type Values Removed Values Added
References (DEBIAN) http://www.debian.org/security/2004/dsa-543 - (DEBIAN) http://www.debian.org/security/2004/dsa-543 - Third Party Advisory
References (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 - (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 - Broken Link
References (BID) http://www.securityfocus.com/bid/11078 - (BID) http://www.securityfocus.com/bid/11078 - Third Party Advisory, VDB Entry
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/17157 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/17157 - Third Party Advisory, VDB Entry
References (CONFIRM) http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt - (CONFIRM) http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt - Patch, Vendor Advisory
References (CERT-VN) http://www.kb.cert.org/vuls/id/795632 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/795632 - Third Party Advisory, US Government Resource
References (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml - Vendor Advisory (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4936 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4936 - Broken Link, Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10709 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10709 - Broken Link, Third Party Advisory
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=109508872524753&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=109508872524753&w=2 - Issue Tracking, Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2004-350.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2004-350.html - Third Party Advisory
References (TRUSTIX) http://www.trustix.net/errata/2004/0045/ - Patch, Vendor Advisory (TRUSTIX) http://www.trustix.net/errata/2004/0045/ - Broken Link
References (CERT) http://www.us-cert.gov/cas/techalerts/TA04-247A.html - US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA04-247A.html - Third Party Advisory, US Government Resource
CWE CWE-119 CWE-415
CPE cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*

Information

Published : 2004-09-28 04:00

Updated : 2024-02-02 15:27


NVD link : CVE-2004-0642

Mitre link : CVE-2004-0642

CVE.ORG link : CVE-2004-0642


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server

debian

  • debian_linux

mit

  • kerberos_5
CWE
CWE-415

Double Free