CVE-2002-1235

NameCVE-2002-1235
DescriptionThe kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDSA-183, DSA-184, DSA-185

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
heimdal (PTS)buster7.5.0+dfsg-3fixed
bullseye7.7.0+dfsg-2fixed
bookworm7.7.0+dfsg-4fixed
sid7.7.0+dfsg-6fixed
krb5 (PTS)buster1.17-3+deb10u4fixed
buster (security)1.17-3+deb10u2fixed
bullseye1.18.3-6+deb11u2fixed
bookworm, sid1.20-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
heimdalsourcewoody0.4e-7.woody.5DSA-185
heimdalsource(unstable)0.4e-22
krb4sourcewoody1.1-8-2.2DSA-184
krb4source(unstable)1.1-11-8
krb5sourcewoody1.2.4-5woody3DSA-183
krb5source(unstable)1.2.6-2

Search for package or bug name: Reporting problems