The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
References
Configurations
History
No history.
Information
Published : 2002-11-04 05:00
Updated : 2024-02-04 16:31
NVD link : CVE-2002-1235
Mitre link : CVE-2002-1235
CVE.ORG link : CVE-2002-1235
JSON object : View
Products Affected
mit
- kerberos_5
debian
- debian_linux
kth
- kth_kerberos_5
- kth_kerberos_4
CWE