The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
History
                    21 Nov 2024, 00:21
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://docs.info.apple.com/article.html?artnum=305391 - Broken Link | |
| References | () http://fedoranews.org/cms/node/2375 - Broken Link | |
| References | () http://fedoranews.org/cms/node/2376 - Broken Link | |
| References | () http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - Mailing List | |
| References | () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html - Broken Link | |
| References | () http://osvdb.org/31281 - Broken Link | |
| References | () http://secunia.com/advisories/23667 - Broken Link | |
| References | () http://secunia.com/advisories/23696 - Broken Link | |
| References | () http://secunia.com/advisories/23701 - Broken Link | |
| References | () http://secunia.com/advisories/23706 - Broken Link | |
| References | () http://secunia.com/advisories/23707 - Broken Link | |
| References | () http://secunia.com/advisories/23772 - Broken Link | |
| References | () http://secunia.com/advisories/23903 - Broken Link | |
| References | () http://secunia.com/advisories/24966 - Broken Link | |
| References | () http://security.gentoo.org/glsa/glsa-200701-21.xml - Third Party Advisory | |
| References | () http://securitytracker.com/id?1017493 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt - Patch, Vendor Advisory | |
| References | () http://www.kb.cert.org/vuls/id/481564 - Patch, Third Party Advisory, US Government Resource | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:008 - Third Party Advisory | |
| References | () http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html - Broken Link | |
| References | () http://www.securityfocus.com/archive/1/456406/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.securityfocus.com/bid/21970 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.ubuntu.com/usn/usn-408-1 - Third Party Advisory | |
| References | () http://www.us-cert.gov/cas/techalerts/TA07-009B.html - Broken Link, Patch, Third Party Advisory, US Government Resource | |
| References | () http://www.us-cert.gov/cas/techalerts/TA07-109A.html - Broken Link, Third Party Advisory, US Government Resource | |
| References | () http://www.vupen.com/english/advisories/2007/0111 - Broken Link | |
| References | () http://www.vupen.com/english/advisories/2007/1470 - Broken Link | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31422 - Third Party Advisory, VDB Entry | |
| References | () https://issues.rpath.com/browse/RPL-925 - Broken Link | 
09 Feb 2024, 03:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (CERT) http://www.us-cert.gov/cas/techalerts/TA07-109A.html - Broken Link, Third Party Advisory, US Government Resource | |
| References | (OPENPKG) http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html - Broken Link | |
| References | (SECUNIA) http://secunia.com/advisories/23696 - Broken Link | |
| References | (SECTRACK) http://securitytracker.com/id?1017493 - Broken Link, Third Party Advisory, VDB Entry | |
| References | (CERT) http://www.us-cert.gov/cas/techalerts/TA07-009B.html - Broken Link, Patch, Third Party Advisory, US Government Resource | |
| References | (SECUNIA) http://secunia.com/advisories/23903 - Broken Link | |
| References | (OSVDB) http://osvdb.org/31281 - Broken Link | |
| References | (SUSE) http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html - Broken Link | |
| References | (VUPEN) http://www.vupen.com/english/advisories/2007/1470 - Broken Link | |
| References | (SECUNIA) http://secunia.com/advisories/23707 - Broken Link | |
| References | (FEDORA) http://fedoranews.org/cms/node/2376 - Broken Link | |
| References | (BID) http://www.securityfocus.com/bid/21970 - Broken Link, Third Party Advisory, VDB Entry | |
| References | (GENTOO) http://security.gentoo.org/glsa/glsa-200701-21.xml - Third Party Advisory | |
| References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/31422 - Third Party Advisory, VDB Entry | |
| References | (SECUNIA) http://secunia.com/advisories/23701 - Broken Link | |
| References | (CONFIRM) https://issues.rpath.com/browse/RPL-925 - Broken Link | |
| References | (UBUNTU) http://www.ubuntu.com/usn/usn-408-1 - Third Party Advisory | |
| References | (VUPEN) http://www.vupen.com/english/advisories/2007/0111 - Broken Link | |
| References | (SECUNIA) http://secunia.com/advisories/23667 - Broken Link | |
| References | (APPLE) http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - Mailing List | |
| References | (BUGTRAQ) http://www.securityfocus.com/archive/1/456406/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
| References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:008 - Third Party Advisory | |
| References | (SECUNIA) http://secunia.com/advisories/24966 - Broken Link | |
| References | (SECUNIA) http://secunia.com/advisories/23772 - Broken Link | |
| References | (SECUNIA) http://secunia.com/advisories/23706 - Broken Link | |
| References | (FEDORA) http://fedoranews.org/cms/node/2375 - Broken Link | |
| References | (CONFIRM) http://docs.info.apple.com/article.html?artnum=305391 - Broken Link | |
| First Time | Canonical Canonical ubuntu Linux | |
| CWE | CWE-824 | |
| CPE | cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* | 
Information
                Published : 2006-12-31 05:00
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6143
Mitre link : CVE-2006-6143
CVE.ORG link : CVE-2006-6143
JSON object : View
Products Affected
                canonical
- ubuntu_linux
mit
- kerberos_5
CWE
                
                    
                        
                        CWE-824
                        
            Access of Uninitialized Pointer
