HIGH · 10.0

CVE-2002-1235

The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, ...

Vulnerability Description

The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.

CVSS Score

10.0

HIGH

AV:N/AC:L/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
KthKth Kerberos 4< 1.2.1
KthKth Kerberos 5< 0.5.1
MitKerberos 5>= 1.0, <= 1.2.6
DebianDebian Linux3.0

References

FAQ

What is CVE-2002-1235?

CVE-2002-1235 is a vulnerability with a CVSS score of 10.0 (HIGH). The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, ...

How severe is CVE-2002-1235?

CVE-2002-1235 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2002-1235?

Check the references section above for vendor advisories and patch information. Affected products include: Kth Kth Kerberos 4, Kth Kth Kerberos 5, Mit Kerberos 5, Debian Debian Linux.