Vulnerability Details : CVE-2006-6144
The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2006-6144
Probability of exploitation activity in the next 30 days: 7.74%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-6144
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
Vendor statements for CVE-2006-6144
-
Mandriva 2007-01-19Not vulnerable. Mandriva 2007.0 and earlier ship with Kerberos 5 version 1.4.x and as a result are not vulnerable to these issues.
-
Red Hat 2007-03-14Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 ship with versions of Kerberos 5 prior to version 1.4 and are therefore not affected by these vulnerabilities. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
-
http://www.securityfocus.com/archive/1/456409/100/0/threaded
Third Party Advisory;VDB Entry
-
http://securitytracker.com/id?1017494
Third Party Advisory;VDB Entry
-
http://security.gentoo.org/glsa/glsa-200701-21.xml
MIT Kerberos 5: Arbitrary Remote Code Execution (GLSA 200701-21) — Gentoo securityThird Party Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-201294-1
Broken Link
-
http://www.kb.cert.org/vuls/id/831452
Third Party Advisory;US Government Resource
-
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html
Object not found!Broken Link
-
http://www.securityfocus.com/bid/21975
Third Party Advisory;VDB Entry
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1
Broken Link
-
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html
Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/31417
Third Party Advisory;VDB Entry
-
http://www.us-cert.gov/cas/techalerts/TA07-009B.html
Page Not Found | CISAThird Party Advisory;US Government Resource
-
https://issues.rpath.com/browse/RPL-925
Broken Link
-
http://www.vupen.com/english/advisories/2007/0112
Third Party Advisory
-
http://www.vupen.com/english/advisories/2007/0111
Webmail: access your OVH emails on ovhcloud.com | OVHcloudThird Party Advisory
-
http://fedoranews.org/cms/node/2375
404 Not FoundBroken Link
-
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-003-mechglue.txt
Patch;Vendor Advisory
- cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*