{"vuid":"VU#883632","idnumber":"883632","name":"MIT Kerberos 5 kadmind buffer overflow vulnerability","keywords":["MIT Kerberos 5","kadmind","arbitrary code execution","RPC","apple_2007_008"],"overview":"An unspecified vulnerability in MIT Kerberos kadmind server may allow an attacker to execute arbitrary code.","clean_desc":"Kerberos is a network authentication system that uses a trusted third party to authenticate clients and servers to each other. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. MIT Kerberos code is used in network applications from a variety of different vendors and is included in many UNIX and Linux distributions. The kadmind daemon is the administration server that runs on the master Kerberos server. From the kadmind manual page: This command starts the KADM5 administration server. The administration server runs on the master Kerberos server, which stores the KDC principal database and the KADM5 policy database. Kadmind accepts remote requests to administer the information--exclude in these databases. Remote requests are sent, for example, by kadmin(8) and the kpasswd(1) command, both of which are clients of kadmind. Per MITKRB5-SA-2007-006 there is a stack buffer overflow in the RPCSEC_GSS authentication in the RPC library that is included in krb5-1.4 through krb5-1.6.2. Any programs that link against the RPC library may also be affected. Note that per MITKRB5-SA-2007-006, versions of kerberos prior to krb5-1.5 are not affected.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code.","resolution":"Update\nThe Kerberos team has released an update to address this issue. Please see MITKRB5-SA-2007-006 for more information on obtaining fixed software.","workarounds":"Restrict access Restricng network access to the Kerberos server may partially mitigate this vulnerability. kadmind listens on 749/tcp by default.","sysaffected":"","thanks":"Thanks to the MIT Kerberos team for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-006.txt","http://secunia.com/advisories/26676/","http://docs.info.apple.com/article.html?artnum=307041"],"cveids":["CVE-2007-3999"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-08-22T13:33:49Z","publicdate":"2007-09-04T00:00:00Z","datefirstpublished":"2007-09-04T19:17:06Z","dateupdated":"2007-11-15T13:21:04Z","revision":28,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"4","cam_attackeraccessrequired":"15","cam_scorecurrent":"8.60625","cam_scorecurrentwidelyknown":"10.040625","cam_scorecurrentwidelyknownexploited":"15.778125","ipprotocol":"tcp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.60625,"vulnote":null}