APP: Kerberos Heap Double Free (2)

This signature detects attempts to exploit a known vulnerability in the Kerberos protocol. A successful attack can lead to remote arbitrary code execution. Note: this signature should not be utilized on a network running Kerberos 5 1.1 or higher.

Extended Description

MIT Kerberos 5 is prone to a remote double-free vulnerability. Remote attackers can trigger this issue prior to any authentication whatsoever. The issue exists in the 'revcauth_common()' helper function. Because of the code path taken in the vulnerable function, exploitation may be hindered. However, attackers may presumably leverage this issue to execute arbitrary code in the context of the affected service. Note that successful exploitation of this issue on a Kerberos Key Distribution Center (KDC) computer may result in the compromise of an entire Kerberos realm.

Affected Products

Mandriva corporate_server

Short Name
APP:KERBEROS:DBLFREE-2
Severity
Minor
Recommended
False
Recommended Action
None
Category
APP
Keywords
(2) CVE-2005-1689 CVE-2010-1320 CVE-2013-1418 Double Free Heap Kerberos bid:14239
Release Date
08/04/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3602
Port
UDP/88
False Positive
Occasionally
Vendors

Red_hat

Conectiva

Suse

Gentoo

Trustix

Sun

Hp

Turbolinux

Mit

Sgi

Ubuntu

Mandriva

Debian

Apple

CVSS Score

7.5

4.0

4.3

Found a potential security threat?