Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the e_msg variable in the kerb_err_reply function.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.cert.org/advisories/CA-2000-11.html | third party advisory us government resource |
http://ciac.llnl.gov/ciac/bulletins/k-051.shtml | third party advisory government resource broken link |
http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html | mailing list broken link |
http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt | patch vendor advisory |
http://www.redhat.com/support/errata/RHSA-2000-031.html | third party advisory vendor advisory |
http://www.osvdb.org/4875 | vdb entry broken link |