header-logo
Suggest Exploit
vendor:
Kerberos
by:
Unknown
7.5
CVSS
HIGH
Remote Memory-Corruption
Unknown
CWE
Product Name: Kerberos
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

MIT Kerberos Remote Memory-Corruption Vulnerability

An authenticated attacker can exploit this issue by sending specially crafted ticket-renewal requests to a vulnerable computer. Successfully exploiting this issue can allow the attacker to execute arbitrary code with superuser privileges, completely compromising the affected computer. Failed exploit attempts will result in a denial-of-service condition.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/39599/info

MIT Kerberos is prone to a remote memory-corruption vulnerability.

An authenticated attacker can exploit this issue by sending specially crafted ticket-renewal requests to a vulnerable computer.

Successfully exploiting this issue can allow the attacker to execute arbitrary code with superuser privileges, completely compromising the affected computer. Failed exploit attempts will result in a denial-of-service condition. 

The following proof-of-concept command is available:

% kinit -R

We currently are unaware of any exploits that result in code-execution.