k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/16071 | vdb entry third party advisory |
http://www.debian.org/security/2004/dsa-504 | broken link third party advisory patch vendor advisory |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020998.html | mailing list third party advisory broken link |
http://marc.info/?l=bugtraq&m=108386148126457&w=2 | mailing list |
http://security.gentoo.org/glsa/glsa-200405-23.xml | third party advisory vendor advisory |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:09.kadmind.asc | broken link third party advisory vendor advisory |