Vulnerability Note VU#554257

MIT Kerberos kadmind principal renaming stack buffer overflow

Original Release date: 26 Jun 2007 | Last revised: 14 Aug 2007


The MIT Kerberos administration daemon (kadmind) contains a stack buffer overflow that may allow a remote, authenticated attacker to execute arbitrary code or cause a denial of service.


A vulnerability exists in the way the principal renaming operation used by the Kerberos administration daemon handles strings and a fixed-size stack buffer. This vulnerability may cause a buffer overflow vulnerability that could allow a remote, authenticated user to execute arbitrary code. According to MIT krb5 Security Advisory MITKRB5-SA-2007-005:

    The kadmind code which performs the principal renaming operation passes unchecked string arguments to a sprintf() call which has a fixed-size stack buffer as its destination. These strings are the old and new principal names passed to the rename operation. The attacker needs to authenticate to kadmind to perform this attack, but no administrative privileges are required because the vulnerable code executes prior to privilege verification.

Note that this issue affects all releases of MIT krb5 up to and including krb5-1.6.1. MIT has been provided with proof-of-concept exploit code, but it's not clear whether the exploit code is publicly available yet.


A remote, authenticated user may be able to execute arbitrary code on an affected system or cause the affected program to crash, resulting in a denial of service. Secondary impacts of code execution include complete compromise of the Kerberos key database.


Apply a patch
A patch can be obtained from MIT krb5 Security Advisory MITKRB5-SA-2007-005. MIT also states that this will be addressed in the upcoming krb5-1.6.2 and krb5-1.5.4 releases.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Debian GNU/LinuxAffected18 Jun 200730 Jul 2007
Gentoo LinuxAffected18 Jun 200714 Aug 2007
Red Hat, Inc.Affected18 Jun 200726 Jun 2007
Sun Microsystems, Inc.Affected18 Jun 200728 Jun 2007
UbuntuAffected18 Jun 200727 Jun 2007
CyberSafe, Inc.Not Affected18 Jun 200718 Jun 2007
Juniper Networks, Inc.Not Affected18 Jun 200726 Jun 2007
Microsoft CorporationNot Affected18 Jun 200719 Jun 2007
Network Appliance, Inc.Not Affected-27 Jun 2007
Apple Computer, Inc.Unknown18 Jun 200718 Jun 2007
AttachmateWRQ, Inc.Unknown18 Jun 200718 Jun 2007
Conectiva Inc.Unknown18 Jun 200718 Jun 2007
Cray Inc.Unknown18 Jun 200718 Jun 2007
EMC CorporationUnknown18 Jun 200718 Jun 2007
Engarde Secure LinuxUnknown18 Jun 200718 Jun 2007
If you are a vendor and your product is affected, let us know.View More »

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to MIT for reporting this vulnerability, who in turn credit an anonymous discoverer working with iDefense.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2007-2798
  • Date Public: 26 Jun 2007
  • Date First Published: 26 Jun 2007
  • Date Last Updated: 14 Aug 2007
  • Severity Metric: 16.80
  • Document Revision: 16


If you have feedback, comments, or additional information about this vulnerability, please send us email.