search menu icon-carat-right cmu-wordmark

CERT Coordination Center

MIT Kerberos 5 ksu may allow either the '-r' or '-l' time-interval parameter to overflow the stack with the characters ''d', 'h', 'm', or 's'

Vulnerability Note VU#38336

Original Release Date: 2000-10-19 | Last Revised: 2003-04-11



From the reporter:

Time-interval parsing for the "-r" and "-l" command-line options calls a library routine which uses sscanf("%d%[d]") and passes the address of an automatic int variable to correspond to the second %-sequence. But the %[ sequence needs an arbitrarily large string buffer. So it's possible to get an arbitrary-length string consisting entirely of the letter 'd' written to the stack. Other sscanf formats it tries to use will also allow a string of 'h', 'm', or 's' characters to be written, with all characters the same in any string.


Local user may be able to crash the machine by overwriting the stack with the characters 'd', 'h', 'm', or 's'


Vendor Information

CVSS Metrics

Group Score Vector



This document was written by Jeff S Havrilla.

Other Information

CVE IDs: CVE-2000-0392
CERT Advisory: CA-2000-06
Date Public: 2000-05-16
Date First Published: 2000-10-19
Date Last Updated: 2003-04-11 22:28 UTC
Document Revision: 9

Sponsored by CISA.