CVE-2006-6143
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
La librería RPC del Kerberos 5 1.4 hasta la 1.4.4 y de la 1.5 hasta la 1.5.1, como la usada en el demonio de administración del Kerberos (kadmind) y otros productos que utilizan esta librería, llama a un puntero de función sin inicializar en una memoria liberada, lo que permite a atacantes remotos provocar una denegación de servicio (caída) y la posibilidad de ejecutar código de su elección mediante vectores sin especificar.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-11-28 CVE Reserved
- 2006-12-31 CVE Published
- 2024-02-09 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-824: Access of Uninitialized Pointer
CAPEC
References (29)
URL | Tag | Source |
---|---|---|
http://docs.info.apple.com/article.html?artnum=305391 | Broken Link | |
http://osvdb.org/31281 | Broken Link | |
http://secunia.com/advisories/23667 | Broken Link | |
http://secunia.com/advisories/23696 | Broken Link | |
http://secunia.com/advisories/23701 | Broken Link | |
http://secunia.com/advisories/23706 | Broken Link | |
http://secunia.com/advisories/23707 | Broken Link | |
http://secunia.com/advisories/23772 | Broken Link | |
http://secunia.com/advisories/23903 | Broken Link | |
http://secunia.com/advisories/24966 | Broken Link | |
http://securitytracker.com/id?1017493 | Broken Link | |
http://www.securityfocus.com/archive/1/456406/100/0/threaded | Broken Link | |
http://www.securityfocus.com/bid/21970 | Broken Link | |
http://www.us-cert.gov/cas/techalerts/TA07-109A.html | Broken Link | |
http://www.vupen.com/english/advisories/2007/0111 | Broken Link | |
http://www.vupen.com/english/advisories/2007/1470 | Broken Link | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31422 | Third Party Advisory | |
https://issues.rpath.com/browse/RPL-925 | Broken Link |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt | 2024-02-09 | |
http://www.kb.cert.org/vuls/id/481564 | 2024-02-09 | |
http://www.us-cert.gov/cas/techalerts/TA07-009B.html | 2024-02-09 |
URL | Date | SRC |
---|---|---|
http://fedoranews.org/cms/node/2375 | 2024-02-09 | |
http://fedoranews.org/cms/node/2376 | 2024-02-09 | |
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html | 2024-02-09 | |
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html | 2024-02-09 | |
http://security.gentoo.org/glsa/glsa-200701-21.xml | 2024-02-09 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:008 | 2024-02-09 | |
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html | 2024-02-09 | |
http://www.ubuntu.com/usn/usn-408-1 | 2024-02-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.4 Search vendor "Mit" for product "Kerberos 5" and version "1.4" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.4.1 Search vendor "Mit" for product "Kerberos 5" and version "1.4.1" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.4.2 Search vendor "Mit" for product "Kerberos 5" and version "1.4.2" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.4.3 Search vendor "Mit" for product "Kerberos 5" and version "1.4.3" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.4.4 Search vendor "Mit" for product "Kerberos 5" and version "1.4.4" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.5 Search vendor "Mit" for product "Kerberos 5" and version "1.5" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.5.1 Search vendor "Mit" for product "Kerberos 5" and version "1.5.1" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 6.06 Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 6.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "6.10" | - |
Affected
|