Description
The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Felipe Ortega · textremotelinux
https://www.exploit-db.com/exploits/35606
References (18)
Core 18
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/517484/100/0/threaded
Patch, Vendor Advisory x_refsource_confirm
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2011-0447.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/47310
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/44181
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1025320
Various Sources vendor-advisory
x_refsource_suse
https://hermes.opensuse.org/messages/8086843
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/44125
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/44196
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0997
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/71789
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0936
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2011:077
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0986
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/8200
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html
Various Sources x_refsource_confirm
http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899
Issue Tracking x_refsource_confirm
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726
Scores
EPSS
0.5402
EPSS Percentile
98.0%
Details
CWE
CWE-20
Status
published
Products (7)
mit/kerberos_5
1.7
mit/kerberos_5
1.7.1
mit/kerberos_5
1.8
mit/kerberos_5
1.8.1
mit/kerberos_5
1.8.2
mit/kerberos_5
1.8.3
mit/kerberos_5
1.9
Published
Apr 15, 2011
Tracked Since
Feb 18, 2026