{"id":"CVE-2006-6143","details":"The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.","modified":"2026-04-10T03:37:52.120498Z","published":"2006-12-31T05:00:00Z","related":["openSUSE-SU-2024:10899-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/23667"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23696"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23701"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23706"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23707"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23772"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23903"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24966"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200701-21.xml"},{"type":"ADVISORY","url":"http://securitytracker.com/id?1017493"},{"type":"ADVISORY","url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt"},{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/481564"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:008"},{"type":"ADVISORY","url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/456406/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/21970"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-408-1"},{"type":"ADVISORY","url":"http://www.us-cert.gov/cas/techalerts/TA07-009B.html"},{"type":"ADVISORY","url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/0111"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/1470"},{"type":"ADVISORY","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/31422"},{"type":"ARTICLE","url":"http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html"},{"type":"FIX","url":"http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt"},{"type":"FIX","url":"http://www.kb.cert.org/vuls/id/481564"},{"type":"FIX","url":"http://www.us-cert.gov/cas/techalerts/TA07-009B.html"},{"type":"WEB","url":"http://docs.info.apple.com/article.html?artnum=305391"},{"type":"WEB","url":"http://fedoranews.org/cms/node/2375"},{"type":"WEB","url":"http://fedoranews.org/cms/node/2376"},{"type":"WEB","url":"http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html"},{"type":"WEB","url":"http://osvdb.org/31281"},{"type":"WEB","url":"http://securitytracker.com/id?1017493"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/481564"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/456406/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/21970"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA07-009B.html"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA07-109A.html"},{"type":"WEB","url":"https://issues.rpath.com/browse/RPL-925"}],"schema_version":"1.7.5"}