CVE-2004-0434

k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*

History

02 Feb 2024, 03:05

Type Values Removed Values Added
CWE CWE-787 CWE-131
References (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html - Third Party Advisory (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html - Broken Link, Third Party Advisory
References (FREEBSD) ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc - Third Party Advisory (FREEBSD) ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc - Broken Link, Third Party Advisory
References (DEBIAN) http://www.debian.org/security/2004/dsa-504 - Patch, Third Party Advisory (DEBIAN) http://www.debian.org/security/2004/dsa-504 - Broken Link, Patch, Third Party Advisory
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8

Information

Published : 2004-07-07 04:00

Updated : 2024-02-02 03:05


NVD link : CVE-2004-0434

Mitre link : CVE-2004-0434


JSON object : View

Products Affected

debian

  • debian_linux

heimdal_project

  • heimdal
CWE
CWE-131

Incorrect Calculation of Buffer Size