Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
02 Feb 2024, 15:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2004/dsa-543 - Mailing List, Third Party Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/11078 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA04-247A.html - Broken Link, Third Party Advisory, US Government Resource |
02 Feb 2021, 18:05
Type | Values Removed | Values Added |
---|---|---|
References | (DEBIAN) http://www.debian.org/security/2004/dsa-543 - Third Party Advisory | |
References | (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/11078 - Third Party Advisory, VDB Entry | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/17157 - Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt - Patch, Vendor Advisory | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/795632 - Third Party Advisory, US Government Resource | |
References | (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml - Third Party Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4936 - Broken Link, Third Party Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10709 - Broken Link, Third Party Advisory | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=109508872524753&w=2 - Issue Tracking, Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2004-350.html - Third Party Advisory | |
References | (TRUSTIX) http://www.trustix.net/errata/2004/0045/ - Broken Link | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA04-247A.html - Third Party Advisory, US Government Resource | |
CWE | CWE-415 | |
CPE | cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:* cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:* |
Information
Published : 2004-09-28 04:00
Updated : 2024-02-02 15:27
NVD link : CVE-2004-0642
Mitre link : CVE-2004-0642
CVE.ORG link : CVE-2004-0642
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_server
debian
- debian_linux
mit
- kerberos_5
CWE
CWE-415
Double Free