This exploit demonstrates a remote buffer overflow in Kerberos kadmind service (krb5-1.5.1) via crafted input to the kadmin client, leading to potential remote code execution as root. The PoC includes shellcode and a modified kadmin client to bypass input filtering.
Classification
Working Poc 90%
Target:
Kerberos kadmind (krb5-1.5.1, krb5-server-1.4.3-5.1)
Auth required
Prerequisites:
Valid Kerberos admin account · Access to kadmin client · Modified kadmin client to bypass input filtering