Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.redhat.com/support/errata/RHSA-2001-060.html | third party advisory vendor advisory |
http://marc.info/?l=bugtraq&m=98826223517788&w=2 | issue tracking mailing list third party advisory |
http://web.mit.edu/kerberos/www/advisories/ftpbuf.txt | patch vendor advisory |
http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-022-01 | third party advisory vendor advisory |