CVE-2002-1235

NameCVE-2002-1235
DescriptionThe kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-183, DSA-184, DSA-185
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
heimdal (PTS)stretch (security), stretch7.1.0+dfsg-13+deb9u3fixed
buster7.5.0+dfsg-3fixed
bullseye, sid7.7.0+dfsg-2fixed
krb5 (PTS)stretch1.15-1+deb9u1fixed
buster1.17-3fixed
bullseye, sid1.17-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
heimdalsourcewoody0.4e-7.woody.5DSA-185
heimdalsource(unstable)0.4e-22
krb4sourcewoody1.1-8-2.2DSA-184
krb4source(unstable)1.1-11-8
krb5sourcewoody1.2.4-5woody3DSA-183
krb5source(unstable)1.2.6-2

Search for package or bug name: Reporting problems