RPC: MIT Kerberos kadmind Overflow

This signature detects attempts to exploit a known vulnerability in MIT Kerberios kadmind. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server, typically root.

Extended Description

Kerberos 5 'kadmind' (Kerberos Administration Daemon) server is prone to a stack-based buffer-overflow vulnerability because the software fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code with superuser privileges. A successful attack can result in the complete compromise of the application. Failed attempts will likely result in denial-of-service conditions. All 'kadmind' servers run on the master Kerberos server. Since the master server holds the KDC principal and policy database, an attack may not only compromise the affected computer, but could also compromise multiple hosts that use the server for authentication. Kerberos 5 'kadmind' 1.4 through 1.6.2 are vulnerable; third-party applications using the affected RPC library are also affected.

Affected Products

Suse office_server

Short Name
RPC:KADMIND-OF
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
RPC
Keywords
CVE-2007-3999 Kerberos MIT Overflow bid:25534 kadmind
Release Date
10/04/2007
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3729
Port
TCP/749
False Positive
Unknown
Vendors

Red_hat

Suse

Apple

Gentoo

Libtirpc

Sun

Rpath

Avaya

Debian

Mandriva

Trustix

Nfs

Ubuntu

Novell

Foresight_linux

Mit

CVSS Score

10.0

Found a potential security threat?