k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.
References
Link | Resource |
---|---|
http://www.debian.org/security/2004/dsa-504 | Patch Third Party Advisory |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html | Third Party Advisory |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc | Third Party Advisory |
http://security.gentoo.org/glsa/glsa-200405-23.xml | Third Party Advisory |
http://marc.info/?l=bugtraq&m=108386148126457&w=2 | Mailing List Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16071 | Third Party Advisory VDB Entry |
Information
Published : 2004-07-06 21:00
Updated : 2020-11-16 11:29
NVD link : CVE-2004-0434
Mitre link : CVE-2004-0434
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
debian
- debian_linux
heimdal_project
- heimdal