RPC: MIT Kerberos kadmind Rename Principal Buffer Overflow

This signature detects attempts to exploit a known vulnerability against MIT Kerberos Kadmind. A successful attack can lead to arbitrary code execution.

Extended Description

Kerberos 5 'kadmind' (Kerberos Administration Daemon) server is prone to a stack-based buffer-overflow vulnerability because the software fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code with administrative privileges. A successful attack can result in the complete compromise of the application. Failed attempts will likely result in denial-of-service conditions. All 'kadmind' servers run on the master Kerberos server. Since the master server holds the KDC principal and policy database, an attack may not only compromise the affected computer, but could also compromise multiple hosts that use the server for authentication. Kerberos 5 'kadmind' 1.6.1, 1.5.3, and prior versions are vulnerable.

Affected Products

Vmware esx_server

References

BugTraq: 24653

CVE: CVE-2007-2798

Short Name
RPC:KADMIND-RENAME
Severity
Major
Recommended
False
Recommended Action
Drop
Category
RPC
Keywords
Buffer CVE-2007-2798 Kerberos MIT Overflow Principal Rename bid:24653 kadmind
Release Date
02/18/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3353
Port
TCP/749
False Positive
Unknown
Vendors

Red_hat

Suse

Apple

Gentoo

Sun

Turbolinux

Avaya

Debian

Sgi

Novell

Trustix

Ubuntu

Mandriva

Foresight_linux

Mit

Vmware

CVSS Score

9.0

Found a potential security threat?