Vulnerability Details : CVE-2002-1235
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
Vulnerability category: OverflowExecute code
Products affected by CVE-2002-1235
- cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
- cpe:2.3:a:kth:kth_kerberos_4:*:*:*:*:*:*:*:*
- cpe:2.3:a:kth:kth_kerberos_5:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1235
29.36%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1235
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2002-1235
-
http://www.iss.net/security_center/static/10430.php
Third Party Advisory
-
http://archives.neohapsis.com/archives/bugtraq/2002-10/0399.html
Third Party Advisory
-
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-026.txt.asc
Third Party Advisory
-
http://marc.info/?l=bugtraq&m=103564944215101&w=2
'Updated: MITKRB5-SA-2002-002: Buffer overflow in kadmind4' - MARCMailing List;Third Party Advisory
-
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-073.php
Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2002-242.html
SupportThird Party Advisory
-
http://www.debian.org/security/2002/dsa-183
Debian -- The Universal Operating SystemThird Party Advisory
-
http://www.securityfocus.com/bid/6024
Patch;Third Party Advisory;VDB Entry;Vendor Advisory
-
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt
Vendor Advisory
-
http://marc.info/?l=bugtraq&m=103582517126392&w=2
'GLSA: krb5' - MARCMailing List;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=103582805330339&w=2
'Re: Buffer overflow in kadmind4' - MARCMailing List;Third Party Advisory
-
http://www.kb.cert.org/vuls/id/875073
VU#875073 - Kerberos administration daemon vulnerable to buffer overflowThird Party Advisory;US Government Resource
-
http://marc.info/?l=bugtraq&m=103539530729206&w=2
'MITKRB5-SA-2002-002: Buffer overflow in kadmind4' - MARCMailing List;Third Party Advisory
-
http://www.debian.org/security/2002/dsa-185
Debian -- The Universal Operating SystemThird Party Advisory
-
http://www.pdc.kth.se/heimdal/
404 Not foundThird Party Advisory
-
http://web.mit.edu/kerberos/www/advisories/2002-002-kadm4_attacksig.txt
Vendor Advisory
-
http://www.cert.org/advisories/CA-2002-29.html
2002 CERT AdvisoriesPatch;Third Party Advisory;US Government Resource
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000534
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)Third Party Advisory
-
http://www.debian.org/security/2002/dsa-184
Debian -- The Universal Operating SystemPatch;Third Party Advisory
Jump to