Unrated severityNVD Advisory· Published Dec 31, 2006· Updated Apr 23, 2026
CVE-2006-6143
CVE-2006-6143
Description
The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
Affected products
9cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
29- web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2006-002-rpc.txtnvdPatchVendor Advisory
- www.kb.cert.org/vuls/id/481564nvdPatchThird Party AdvisoryUS Government Resource
- www.us-cert.gov/cas/techalerts/TA07-009B.htmlnvdBroken LinkPatchThird Party AdvisoryUS Government Resource
- security.gentoo.org/glsa/glsa-200701-21.xmlnvdThird Party Advisory
- securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.securityfocus.com/archive/1/456406/100/0/threadednvdBroken LinkThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/21970nvdBroken LinkThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-408-1nvdThird Party Advisory
- www.us-cert.gov/cas/techalerts/TA07-109A.htmlnvdBroken LinkThird Party AdvisoryUS Government Resource
- exchange.xforce.ibmcloud.com/vulnerabilities/31422nvdThird Party AdvisoryVDB Entry
- docs.info.apple.com/article.htmlnvdBroken Link
- fedoranews.org/cms/node/2375nvdBroken Link
- fedoranews.org/cms/node/2376nvdBroken Link
- lists.apple.com/archives/Security-announce/2007/Apr/msg00001.htmlnvdMailing List
- lists.suse.com/archive/suse-security-announce/2007-Jan/0004.htmlnvdBroken Link
- osvdb.org/31281nvdBroken Link
- secunia.com/advisories/23667nvdBroken Link
- secunia.com/advisories/23696nvdBroken Link
- secunia.com/advisories/23701nvdBroken Link
- secunia.com/advisories/23706nvdBroken Link
- secunia.com/advisories/23707nvdBroken Link
- secunia.com/advisories/23772nvdBroken Link
- secunia.com/advisories/23903nvdBroken Link
- secunia.com/advisories/24966nvdBroken Link
- www.openpkg.com/security/advisories/OpenPKG-SA-2007.006.htmlnvdBroken Link
- www.vupen.com/english/advisories/2007/0111nvdBroken Link
- www.vupen.com/english/advisories/2007/1470nvdBroken Link
- issues.rpath.com/browse/RPL-925nvdBroken Link
News mentions
0No linked articles in our index yet.