Summary
The remote host is probably affected by the vulnerabilities described in CVE-2008-0062, CVE-2008-0063, CVE-2008-0947, CVE-2008-0948
Impact
CVE-2008-0062: An unauthenticated remote attacker may cause a krb4-enabled KDC to crash, expose information, or execute arbitrary code. Successful exploitation of this vulnerability could compromise the Kerberos key database and host security on the KDC host.
CVE-2008-0063: An unauthenticated remote attacker may cause a krb4-enabled KDC to expose information. It is theoretically possible for the exposed information to include secret key data on some platforms.
CVE 2008-0947
Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.
CVE 2008-0948
Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions before 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering a large number of open file descriptors.
Solution
All Kerberos users should upgrade to the latest version:
References
Severity
Classification
-
CVE CVE-2008-0062, CVE-2008-0063, CVE-2008-0947, CVE-2008-0948 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe AIR Multiple Vulnerabilities-01 Jan15 (Mac OS X)
- 7T Interactive Graphical SCADA System Multiple Security Vulnerabilities
- Adobe Acrobat and Reader PDF Handling Multiple Vulnerabilities (Linux)
- Adobe Extension Manager CS5 Insecure Library Loading Vulnerability (Win)
- Adobe Air Multiple Vulnerabilities - October 12 (Mac OS X)