CVE-2004-0523

Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier allow remote attackers to execute arbitrary code as root.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860
http://lwn.net/Articles/88206/
http://marc.info/?l=bugtraq&m=108612325909496&w=2
http://marc.info/?l=bugtraq&m=108619161815320&w=2
http://marc.info/?l=bugtraq&m=108619250923790&w=2
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101512-1
http://www.debian.org/security/2004/dsa-520 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200406-21.xml
http://www.kb.cert.org/vuls/id/686862 Third Party Advisory US Government Resource
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:056
http://www.redhat.com/support/errata/RHSA-2004-236.html
http://www.securityfocus.com/bid/10448
https://exchange.xforce.ibmcloud.com/vulnerabilities/16268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10295
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2002
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A724
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A991
ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860
http://lwn.net/Articles/88206/
http://marc.info/?l=bugtraq&m=108612325909496&w=2
http://marc.info/?l=bugtraq&m=108619161815320&w=2
http://marc.info/?l=bugtraq&m=108619250923790&w=2
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101512-1
http://www.debian.org/security/2004/dsa-520 Patch Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200406-21.xml
http://www.kb.cert.org/vuls/id/686862 Third Party Advisory US Government Resource
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:056
http://www.redhat.com/support/errata/RHSA-2004-236.html
http://www.securityfocus.com/bid/10448
https://exchange.xforce.ibmcloud.com/vulnerabilities/16268
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10295
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2002
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A724
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A991
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mit:kerberos:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos:1.2.2.beta1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*
cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:seam:1.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:seam:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:seam:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:tinysofa:tinysofa_enterprise_server:1.0:*:*:*:*:*:*:*
cpe:2.3:a:tinysofa:tinysofa_enterprise_server:1.0_u1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc - () ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc -
References () ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc - () ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 -
References () http://lwn.net/Articles/88206/ - () http://lwn.net/Articles/88206/ -
References () http://marc.info/?l=bugtraq&m=108612325909496&w=2 - () http://marc.info/?l=bugtraq&m=108612325909496&w=2 -
References () http://marc.info/?l=bugtraq&m=108619161815320&w=2 - () http://marc.info/?l=bugtraq&m=108619161815320&w=2 -
References () http://marc.info/?l=bugtraq&m=108619250923790&w=2 - () http://marc.info/?l=bugtraq&m=108619250923790&w=2 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101512-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101512-1 -
References () http://www.debian.org/security/2004/dsa-520 - Patch, Vendor Advisory () http://www.debian.org/security/2004/dsa-520 - Patch, Vendor Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200406-21.xml - () http://www.gentoo.org/security/en/glsa/glsa-200406-21.xml -
References () http://www.kb.cert.org/vuls/id/686862 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/686862 - Third Party Advisory, US Government Resource
References () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:056 - () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:056 -
References () http://www.redhat.com/support/errata/RHSA-2004-236.html - () http://www.redhat.com/support/errata/RHSA-2004-236.html -
References () http://www.securityfocus.com/bid/10448 - () http://www.securityfocus.com/bid/10448 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16268 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16268 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10295 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10295 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2002 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2002 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A724 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A724 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A991 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A991 -

Information

Published : 2004-08-18 04:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0523

Mitre link : CVE-2004-0523

CVE.ORG link : CVE-2004-0523


JSON object : View

Products Affected

mit

  • kerberos
  • kerberos_5

sun

  • sunos
  • solaris
  • seam

tinysofa

  • tinysofa_enterprise_server

sgi

  • propack