Exploit MIT Kerberos 5 - 'src/kdc/do_tgs_req.c' Ticket Renewal Double-Free Memory Corruption

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
33855
Проверка EDB
  1. Пройдено
Автор
JOEL JOHNSON
Тип уязвимости
REMOTE
Платформа
LINUX
CVE
cve-2010-1320
Дата публикации
2010-04-20
Код:
source: https://www.securityfocus.com/bid/39599/info

MIT Kerberos is prone to a remote memory-corruption vulnerability.

An authenticated attacker can exploit this issue by sending specially crafted ticket-renewal requests to a vulnerable computer.

Successfully exploiting this issue can allow the attacker to execute arbitrary code with superuser privileges, completely compromising the affected computer. Failed exploit attempts will result in a denial-of-service condition. 

The following proof-of-concept command is available:

% kinit -R

We currently are unaware of any exploits that result in code-execution.
 
Источник
www.exploit-db.com

Похожие темы