Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2006-6143


The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.


Published

2006-12-31T05:00:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.3 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-824

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mit kerberos_5 1.4 Yes
Application mit kerberos_5 1.4.1 Yes
Application mit kerberos_5 1.4.2 Yes
Application mit kerberos_5 1.4.3 Yes
Application mit kerberos_5 1.4.4 Yes
Application mit kerberos_5 1.5 Yes
Application mit kerberos_5 1.5.1 Yes
Operating System canonical ubuntu_linux 6.06 Yes
Operating System canonical ubuntu_linux 6.10 Yes

References