APP: Kadmin for krb-4.1.2 Buffer Overflow
This signature detects attempts to exploit a known vulnerability against the kadmin daemon. Slackware Linux, SuSE Linux, and some BSD implementations are vulnerable. An attacker might be able to create a denial-of-service (DoS) condition or possibly execute arbitrary code in the host system.
Extended Description
A vulnerability has been discovered in the kadmind daemon. It has been reported that kadmind is vulnerable to a remotely exploitable buffer overflow. This issue is due to insufficient bounds checking. Exploiting this issue could potentially allow an attacker to execute arbitrary code with the privileges of the kadmind process. This issue is reported to exist in the Kerberos 4 administration protocol. Kerberos 5 includes support for the Kerberos 4 administration daemon. Various Kerberos implementations are reported to be affected by this vulnerability. There are reports that this vulnerability is being actively exploited in the wild.
Affected Products
Netbsd netbsd
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Netbsd
Kth
Mit
Freebsd
Ibm
10.0