CVE-2004-0643

Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code.
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 Broken Link
http://marc.info/?l=bugtraq&m=109508872524753&w=2 Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2004-350.html Third Party Advisory
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt Patch Vendor Advisory
http://www.debian.org/security/2004/dsa-543 Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml Vendor Advisory
http://www.kb.cert.org/vuls/id/866472 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/11078 Third Party Advisory VDB Entry
http://www.trustix.net/errata/2004/0045/ Broken Link
http://www.us-cert.gov/cas/techalerts/TA04-247A.html Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/17159 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10267 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3322 Broken Link Third Party Advisory
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 Broken Link
http://marc.info/?l=bugtraq&m=109508872524753&w=2 Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2004-350.html Third Party Advisory
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt Patch Vendor Advisory
http://www.debian.org/security/2004/dsa-543 Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml Vendor Advisory
http://www.kb.cert.org/vuls/id/866472 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/11078 Third Party Advisory VDB Entry
http://www.trustix.net/errata/2004/0045/ Broken Link
http://www.us-cert.gov/cas/techalerts/TA04-247A.html Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/17159 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10267 Broken Link Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3322 Broken Link Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-09-28 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2004-0643

Mitre link : CVE-2004-0643

CVE.ORG link : CVE-2004-0643


JSON object : View

Products Affected

mit

  • kerberos_5

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server

debian

  • debian_linux
CWE
CWE-415

Double Free