Environment
Novell KDC 1.0.2 and prior versions
Situation
An unauthenticated remote user may be able to cause a host running
kadmind to execute arbitrary code. CVE‑2007‑2442 is more
likely to lead to arbitrary code execution than
CVE‑2007‑2443.
Successful exploitation can compromise the Kerberos key database and host security on the host running these programs. (kadmind typically runs as root.) Unsuccessful exploitation attempts will likely result in the affected program crashing.
Third‑party applications calling the RPC library provided with MIT krb5 may be vulnerable. Other RPC libraries derived from SunRPC may be vulnerable.
Successful exploitation can compromise the Kerberos key database and host security on the host running these programs. (kadmind typically runs as root.) Unsuccessful exploitation attempts will likely result in the affected program crashing.
Third‑party applications calling the RPC library provided with MIT krb5 may be vulnerable. Other RPC libraries derived from SunRPC may be vulnerable.
Resolution
This vulnerability is resolved in Novell KDC 1.0.3 and newer available at https://download.novell.com
Status
Security AlertAdditional Information
CVE: CVE-2007-2442 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442
CVE: CVE-2007-2443 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443
CERT: VU#356961 http://www.kb.cert.org/vuls/id/356961
CERT: VU#365313 http://www.kb.cert.org/vuls/id/365313
MITKRB5-SA-2007-004 http://web.mit.edu.kerberos/advisories/MITKRB5-SA-2007-004.txt
CVE: CVE-2007-2443 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443
CERT: VU#356961 http://www.kb.cert.org/vuls/id/356961
CERT: VU#365313 http://www.kb.cert.org/vuls/id/365313
MITKRB5-SA-2007-004 http://web.mit.edu.kerberos/advisories/MITKRB5-SA-2007-004.txt