My Favorites


Please to see your favorites.

  • Bookmark
  • Email Document
  • Printer Friendly
  • Favorite
  • Rating:

Security Vulnerability: kadmind affected by multiple RPC library vulnerabilities

This document (3248163) is provided subject to the disclaimer at the end of this document.


Novell KDC 1.0.2 and prior versions


An unauthenticated remote user may be able to cause a host running kadmind to execute arbitrary code.  CVE‑2007‑2442 is more likely to lead to arbitrary code execution than CVE‑2007‑2443.

Successful exploitation can compromise the Kerberos key database and host security on the host running these programs.  (kadmind typically runs as root.)  Unsuccessful exploitation attempts will likely result in the affected program crashing.

Third‑party applications calling the RPC library provided with MIT krb5 may be vulnerable.  Other RPC libraries derived from SunRPC may be vulnerable.


This vulnerability is resolved in Novell KDC 1.0.3 and newer available at


Security Alert

Additional Information


This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:3248163
  • Creation Date:10-JUL-07
  • Modified Date:30-APR-12
    • NovellOpen Enterprise Server
    • SUSESUSE Linux Enterprise Server
< Back to Support Search

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

Join Our Community

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.

SUSE Customer Support Quick Reference Guide SUSE Technical Support Handbook Update Advisories
Support FAQ

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.

Go to Customer Center