APP: Kadmin for krb-4.1.2 Buffer Overflow

This signature detects attempts to exploit a known vulnerability against the kadmin daemon. Slackware Linux, SuSE Linux, and some BSD implementations are vulnerable. An attacker might be able to create a denial-of-service (DoS) condition or possibly execute arbitrary code in the host system.

Extended Description

A vulnerability has been discovered in the kadmind daemon. It has been reported that kadmind is vulnerable to a remotely exploitable buffer overflow. This issue is due to insufficient bounds checking. Exploiting this issue could potentially allow an attacker to execute arbitrary code with the privileges of the kadmind process. This issue is reported to exist in the Kerberos 4 administration protocol. Kerberos 5 includes support for the Kerberos 4 administration daemon. Various Kerberos implementations are reported to be affected by this vulnerability. There are reports that this vulnerability is being actively exploited in the wild.

Affected Products

Netbsd netbsd

Short Name
APP:MISC:KADMIN-4-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Buffer CA-2002-29 CVE-2002-1235 Kadmin Overflow bid:6024 for krb-4.1.2
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
Port
TCP/749
False Positive
Unknown
Vendors

Netbsd

Kth

Mit

Freebsd

Ibm

CVSS Score

10.0

Found a potential security threat?