CVE-2006-6144

The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.
References
Link Resource
http://fedoranews.org/cms/node/2375 Broken Link
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html Broken Link
http://osvdb.org/31280 Broken Link
http://secunia.com/advisories/23690 Third Party Advisory
http://secunia.com/advisories/23701 Third Party Advisory
http://secunia.com/advisories/23706 Third Party Advisory
http://secunia.com/advisories/23903 Third Party Advisory
http://secunia.com/advisories/35151 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200701-21.xml Third Party Advisory
http://securitytracker.com/id?1017494 Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1 Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1 Broken Link
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/831452 Third Party Advisory US Government Resource
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html Third Party Advisory
http://www.securityfocus.com/archive/1/456409/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/21975 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-009B.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/0111 Third Party Advisory
http://www.vupen.com/english/advisories/2007/0112 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/31417 Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-925 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*

History

02 Feb 2021, 18:13

Type Values Removed Values Added
References (SECUNIA) http://secunia.com/advisories/23903 - (SECUNIA) http://secunia.com/advisories/23903 - Third Party Advisory
References (CONFIRM) https://issues.rpath.com/browse/RPL-925 - (CONFIRM) https://issues.rpath.com/browse/RPL-925 - Broken Link
References (CERT) http://www.us-cert.gov/cas/techalerts/TA07-009B.html - Patch, Third Party Advisory, US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA07-009B.html - Third Party Advisory, US Government Resource
References (VUPEN) http://www.vupen.com/english/advisories/2007/0112 - (VUPEN) http://www.vupen.com/english/advisories/2007/0112 - Third Party Advisory
References (GENTOO) http://security.gentoo.org/glsa/glsa-200701-21.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200701-21.xml - Third Party Advisory
References (OPENPKG) http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html - (OPENPKG) http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2007/0111 - (VUPEN) http://www.vupen.com/english/advisories/2007/0111 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/23701 - (SECUNIA) http://secunia.com/advisories/23701 - Third Party Advisory
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1 - Broken Link
References (SECUNIA) http://secunia.com/advisories/35151 - (SECUNIA) http://secunia.com/advisories/35151 - Third Party Advisory
References (CERT-VN) http://www.kb.cert.org/vuls/id/831452 - Patch, Third Party Advisory, US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/831452 - Third Party Advisory, US Government Resource
References (BUGTRAQ) http://www.securityfocus.com/archive/1/456409/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/456409/100/0/threaded - Third Party Advisory, VDB Entry
References (SUSE) http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html - (SUSE) http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/23690 - (SECUNIA) http://secunia.com/advisories/23690 - Third Party Advisory
References (OSVDB) http://osvdb.org/31280 - (OSVDB) http://osvdb.org/31280 - Broken Link
References (FEDORA) http://fedoranews.org/cms/node/2375 - (FEDORA) http://fedoranews.org/cms/node/2375 - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/31417 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/31417 - Third Party Advisory, VDB Entry
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1 - Broken Link
References (SECTRACK) http://securitytracker.com/id?1017494 - (SECTRACK) http://securitytracker.com/id?1017494 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/23706 - (SECUNIA) http://secunia.com/advisories/23706 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/21975 - (BID) http://www.securityfocus.com/bid/21975 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other NVD-CWE-noinfo

Information

Published : 2006-12-31 05:00

Updated : 2023-12-10 10:40


NVD link : CVE-2006-6144

Mitre link : CVE-2006-6144

CVE.ORG link : CVE-2006-6144


JSON object : View

Products Affected

mit

  • kerberos_5