Security Vulnerability: kadmind affected by multiple RPC library vulnerabilities
This document (3248163) is provided subject to the disclaimer at the end of this document.
Successful exploitation can compromise the Kerberos key database and host security on the host running these programs. (kadmind typically runs as root.) Unsuccessful exploitation attempts will likely result in the affected program crashing.
Third‑party applications calling the RPC library provided with MIT krb5 may be vulnerable. Other RPC libraries derived from SunRPC may be vulnerable.
CVE: CVE-2007-2443 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443
CERT: VU#356961 http://www.kb.cert.org/vuls/id/356961
CERT: VU#365313 http://www.kb.cert.org/vuls/id/365313
This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:3248163
- Creation Date:10-JUL-07
- Modified Date:30-APR-12
- NovellOpen Enterprise Server
- SUSESUSE Linux Enterprise Server