{"vuid":"VU#259798","idnumber":"259798","name":"MIT Kerberos 5 allows unauthenticated attacker to cause MIT krb5 Key Distribution Center to free unallocated memory","keywords":["MIT Kerberos 5","arbitrary code execution","krb5","KDC","free unallocated memory"],"overview":"An unauthenticated attacker can cause MIT krb5 Key Distribution Center (KDC) to free unallocated memory, possibly leading to arbitrary code execution.","clean_desc":"Kerberos is a network authentication system which uses a trusted third party (a KDC) to authenticate clients and servers to each other. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. MIT Kerberos code is used in network applications from a variety of different vendors and is included in many UNIX and Linux distributions. The MIT krb5 Security Advisory 2005-002 issued 2005 July 12, available from \n<http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-002-kdc.txt> states: The MIT krb5 Key Distribution Center (KDC) implementation can corrupt the heap by attempting to free memory at a random address when it receives a certain unlikely (but valid) request via a TCP connection. This attempt to free unallocated memory can result in a KDC crash and consequent denial of service. [CAN-2005-1174, VU#259798] An unauthenticated attacker may be able to use this vulnerability to execute arbitrary code on the KDC host, potentially compromising an entire Kerberos realm. No exploit code is known to exist at this time. Exploitation of these vulnerabilities is believed to be difficult.","impact":"An unauthenticated attacker may be able to execute arbitrary code on the KDC host, potentially compromising an entire Kerberos realm. An unsuccessful attack against this heap corruption vulnerability may result in a denial of service by crashing the KDC process. According to the MIT krb5 Security Advisory 2005-002, this vulnerability affects the KDC implementation in all MIT krb5 releases supporting TCP client connections to the KDC. This includes krb5-1.3 and later releases, up to and including krb5-1.4.1.","resolution":"Apply patches available from your vendor. Details of the patch are also available from http://web.mit.edu/kerberos/advisories/2005-002-patch_1.4.1.txt. If patching can not be performed in a timely manner you could consider disabling TCP support in the KDC to avoid this vulnerability.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by the MIT Kerberos Development Team. The MIT Kerberos Development Team thank Daniel Wachdorf for reporting this vulnerability.","author":"This document was written by Robert Mead based on information in the MIT krb5 Security Advisory 2005-002.","public":["http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2005-002-kdc.txt","http://web.mit.edu/kerberos/advisories/2005-002-patch_1.4.1.txt"],"cveids":["CVE-2005-1174"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-05-09T16:09:35Z","publicdate":"2005-07-12T00:00:00Z","datefirstpublished":"2005-07-13T15:14:42Z","dateupdated":"2005-07-13T15:15:00Z","revision":32,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"17","cam_population":"17","cam_impact":"15","cam_easeofexploitation":"5","cam_attackeraccessrequired":"15","cam_scorecurrent":"11.475","cam_scorecurrentwidelyknown":"13.26796875","cam_scorecurrentwidelyknownexploited":"20.43984375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.475,"vulnote":null}