KTH Kerberos Environment Variable Manipulation
KTH Kerberos contains a vulnerability that may allow/assist in a local or remote root compromise. It is possible for malicious remote users (before authenticating) to remotely set the value of the environment variable 'krb4_proxy' and have the server program contact a fake Kerberos server. This would allow the attacker to intercept authentication requests and/or send false replies to the service they are attempting to use. An attacker, for example, could send the environment variable via telnet to a Kerberos supporting telnet daemon. This attack allows malicious users in control of a fake Kerberos server to exploit a buffer overflow vulnerability (See Bugtraq ID 2091) in the Kerberos shared libraries with malformed replies. If exploited, the combined vulnerabilities may provide remote root access to attackers.