RPC: MIT Kerberos V5 KAdminD klog_vsyslog Server Stack Buffer Overflow
This signature detects attempts to exploit a known vulnerability against MIT Kerberos KAdminD. A successful attack can lead to arbitrary code execution.
Extended Description
Kerberos 5 kadmind (Kerberos Administration Daemon) server is prone to a stack-based buffer-overflow vulnerability because the software fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code with administrative privileges. A successful attack can result in the complete compromise of the application. Failed attempts will likely result in denial-of-service conditions. All kadmind servers run on the master Kerberos server. Since the master server holds the KDC principal and policy database, an attack may not only compromise the affected computer, but could also compromise multiple hosts that use the server for authentication. Kerberos 5 kadmind 1.6 and prior versions are vulnerable.
Affected Products
Mit kerberos_5
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Apple
Gentoo
Sun
Rpath
Turbolinux
Debian
Sgi
Novell
Trustix
Pardus
Ubuntu
Mandriva
Mit
9.0