CVE-2006-6143

The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=305391 Broken Link
http://fedoranews.org/cms/node/2375 Broken Link
http://fedoranews.org/cms/node/2376 Broken Link
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html Mailing List
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html Broken Link
http://osvdb.org/31281 Broken Link
http://secunia.com/advisories/23667 Broken Link
http://secunia.com/advisories/23696 Broken Link
http://secunia.com/advisories/23701 Broken Link
http://secunia.com/advisories/23706 Broken Link
http://secunia.com/advisories/23707 Broken Link
http://secunia.com/advisories/23772 Broken Link
http://secunia.com/advisories/23903 Broken Link
http://secunia.com/advisories/24966 Broken Link
http://security.gentoo.org/glsa/glsa-200701-21.xml Third Party Advisory
http://securitytracker.com/id?1017493 Broken Link Third Party Advisory VDB Entry
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/481564 Patch Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:008 Third Party Advisory
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html Broken Link
http://www.securityfocus.com/archive/1/456406/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/21970 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-408-1 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA07-009B.html Broken Link Patch Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-109A.html Broken Link Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/0111 Broken Link
http://www.vupen.com/english/advisories/2007/1470 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/31422 Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-925 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*

History

09 Feb 2024, 03:26

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-824
CPE cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
First Time Canonical ubuntu Linux
Canonical
References () http://docs.info.apple.com/article.html?artnum=305391 - () http://docs.info.apple.com/article.html?artnum=305391 - Broken Link
References () http://fedoranews.org/cms/node/2375 - () http://fedoranews.org/cms/node/2375 - Broken Link
References () http://fedoranews.org/cms/node/2376 - () http://fedoranews.org/cms/node/2376 - Broken Link
References () http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - () http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - Mailing List
References () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html - () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html - Broken Link
References () http://osvdb.org/31281 - () http://osvdb.org/31281 - Broken Link
References () http://secunia.com/advisories/23667 - () http://secunia.com/advisories/23667 - Broken Link
References () http://secunia.com/advisories/23696 - () http://secunia.com/advisories/23696 - Broken Link
References () http://secunia.com/advisories/23701 - () http://secunia.com/advisories/23701 - Broken Link
References () http://secunia.com/advisories/23706 - () http://secunia.com/advisories/23706 - Broken Link
References () http://secunia.com/advisories/23707 - () http://secunia.com/advisories/23707 - Broken Link
References () http://secunia.com/advisories/23772 - () http://secunia.com/advisories/23772 - Broken Link
References () http://secunia.com/advisories/23903 - () http://secunia.com/advisories/23903 - Broken Link
References () http://secunia.com/advisories/24966 - () http://secunia.com/advisories/24966 - Broken Link
References () http://security.gentoo.org/glsa/glsa-200701-21.xml - () http://security.gentoo.org/glsa/glsa-200701-21.xml - Third Party Advisory
References () http://securitytracker.com/id?1017493 - () http://securitytracker.com/id?1017493 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:008 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:008 - Third Party Advisory
References () http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html - () http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html - Broken Link
References () http://www.securityfocus.com/archive/1/456406/100/0/threaded - () http://www.securityfocus.com/archive/1/456406/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/21970 - () http://www.securityfocus.com/bid/21970 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/usn-408-1 - () http://www.ubuntu.com/usn/usn-408-1 - Third Party Advisory
References () http://www.us-cert.gov/cas/techalerts/TA07-009B.html - Patch, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-009B.html - Broken Link, Patch, Third Party Advisory, US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA07-109A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-109A.html - Broken Link, Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2007/0111 - () http://www.vupen.com/english/advisories/2007/0111 - Broken Link
References () http://www.vupen.com/english/advisories/2007/1470 - () http://www.vupen.com/english/advisories/2007/1470 - Broken Link
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/31422 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/31422 - Third Party Advisory, VDB Entry
References () https://issues.rpath.com/browse/RPL-925 - () https://issues.rpath.com/browse/RPL-925 - Broken Link

Information

Published : 2006-12-31 05:00

Updated : 2024-02-09 03:26


NVD link : CVE-2006-6143

Mitre link : CVE-2006-6143

CVE.ORG link : CVE-2006-6143


JSON object : View

Products Affected

canonical

  • ubuntu_linux

mit

  • kerberos_5
CWE
CWE-824

Access of Uninitialized Pointer