CVE-2004-0772
high-risk
Published 2004-10-20
Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and earlier may allow remote attackers to execute arbitrary code.
Do I need to act?
~
4.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (4)
References (24)
Mailing List
http://marc.info/?l=bugtraq&m=109508872524753&w=2
Mailing List
http://www.debian.org/security/2004/dsa-543
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml
Third Party Advisory
http://www.kb.cert.org/vuls/id/350792
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2004:088
Broken Link
http://www.securityfocus.com/bid/11078
Broken Link
http://www.trustix.net/errata/2004/0045/
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/17158
Mailing List
http://marc.info/?l=bugtraq&m=109508872524753&w=2
Mailing List
http://www.debian.org/security/2004/dsa-543
Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml
Third Party Advisory
http://www.kb.cert.org/vuls/id/350792
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2004:088
Broken Link
http://www.securityfocus.com/bid/11078
and 4 more references
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
8/34 · Low
Exposure
10/34 · Low