CVE-2006-6143

N/A Unknown
Published: December 31, 2006 Modified: April 23, 2026
View on NVD

Description

The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://fedoranews.org/cms/node/2375
Source: cve@mitre.org
Broken Link
http://fedoranews.org/cms/node/2376
Source: cve@mitre.org
Broken Link
http://osvdb.org/31281
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23667
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23696
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23701
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23706
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23707
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23772
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23903
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/24966
Source: cve@mitre.org
Broken Link
http://security.gentoo.org/glsa/glsa-200701-21.xml
Source: cve@mitre.org
Third Party Advisory
http://securitytracker.com/id?1017493
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/481564
Source: cve@mitre.org
Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/archive/1/456406/100/0/threaded
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/21970
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-408-1
Source: cve@mitre.org
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA07-009B.html
Source: cve@mitre.org
Broken Link Patch Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-109A.html
Source: cve@mitre.org
Broken Link Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/0111
Source: cve@mitre.org
Broken Link
http://www.vupen.com/english/advisories/2007/1470
Source: cve@mitre.org
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/31422
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-925
Source: cve@mitre.org
Broken Link
http://docs.info.apple.com/article.html?artnum=305391
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://fedoranews.org/cms/node/2375
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://fedoranews.org/cms/node/2376
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/31281
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23667
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23696
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23701
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23706
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23707
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23772
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23903
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24966
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200701-21.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/id?1017493
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/481564
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:008
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/456406/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/21970
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-408-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA07-009B.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-109A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/0111
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2007/1470
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/31422
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-925
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link

58 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
30.7%
97th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

canonical mit