ID

VAR-200612-0136


CVE

CVE-2006-6652


TITLE

Kerberos administration daemon may free uninitialized pointers

Trust: 0.8

sources: CERT/CC: VU#831452

DESCRIPTION

Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 20050914, NetBSD 2.* and 3.* before 20061203, and Apple Mac OS X before 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a long pathname that results from path expansion. A vulnerability exists in the Kerberos administration daemon that may allow a remote, unauthenticated user to free uninitialized pointers. Freeing uninitialized pointers corrupts memory in a way that could allow an attacker to execute code. NetBSD ftpd and tnftpd are prone to a remote buffer-overflow vulnerability. This issue is due to an off-by-one error; it allows attackers to corrupt memory. Remote attackers may execute arbitrary machine code in the context of the user running the affected application. Failed attempts will likely result in denial-of-service conditions. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Gentoo update for mit-krb5 SECUNIA ADVISORY ID: SA23903 VERIFY ADVISORY: http://secunia.com/advisories/23903/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Gentoo Linux 1.x http://secunia.com/product/339/ DESCRIPTION: Gentoo has issued an update for krb5. This fixes some vulnerabilities, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. For more information: SA23690 SA23696 SOLUTION: Update to "app-crypt/mit-krb5-1.5.2" or later. ORIGINAL ADVISORY: http://www.gentoo.org/security/en/glsa/glsa-200701-21.xml OTHER REFERENCES: SA23690: http://secunia.com/advisories/23690/ SA235696: http://secunia.com/advisories/23696/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2006-6652 // CERT/CC: VU#831452 // JVNDB: JVNDB-2006-000949 // BID: 21377 // VULHUB: VHN-22760 // VULMON: CVE-2006-6652 // PACKETSTORM: 53950

AFFECTED PRODUCTS

vendor:netbsdmodel:netbsdscope:eqversion:3.1

Trust: 1.9

vendor:netbsdmodel:netbsdscope:eqversion:2.1

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:3.0

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:2.0

Trust: 1.6

vendor:applemodel:mac os xscope:eqversion:10.3.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.1.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.0.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.8

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.9

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.8

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.9

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.1.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.1.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.1.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.1.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.10

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.3.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.0.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.4.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.0.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.2.8

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.0.4

Trust: 1.0

vendor:fedoramodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mit kerberos teammodel: - scope: - version: -

Trust: 0.8

vendor:openpkgmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:rpathmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.3.9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.9

Trust: 0.8

vendor:tnftpdmodel:tnftpdscope:eqversion:20040810

Trust: 0.3

vendor:navisionmodel:financials serverscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

sources: CERT/CC: VU#831452 // BID: 21377 // JVNDB: JVNDB-2006-000949 // CNNVD: CNNVD-200612-413 // NVD: CVE-2006-6652

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-6652
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#831452
value: 20.93

Trust: 0.8

NVD: CVE-2006-6652
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200612-413
value: CRITICAL

Trust: 0.6

VULHUB: VHN-22760
value: HIGH

Trust: 0.1

VULMON: CVE-2006-6652
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-6652
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-22760
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-22760 // VULMON: CVE-2006-6652 // JVNDB: JVNDB-2006-000949 // CNNVD: CNNVD-200612-413 // NVD: CVE-2006-6652

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-22760 // NVD: CVE-2006-6652

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200612-413

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200612-413

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000949

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-22760 // VULMON: CVE-2006-6652

PATCH

title:Security Update 2007-004 v1.1 (Universal)url:http://www.apple.com/support/downloads/securityupdate2007004v11universal.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (PPC)url:http://www.apple.com/support/downloads/securityupdate2007004v11ppc.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (10.3.9 Client)url:http://www.apple.com/support/downloads/securityupdate2007004v111039client.html

Trust: 0.8

title:Security Update 2007-004url:http://docs.info.apple.com/article.html?artnum=305391-en

Trust: 0.8

title:Security Update 2007-004url:http://docs.info.apple.com/article.html?artnum=305391-ja

Trust: 0.8

title:Security Update 2007-004 v1.1 (Universal)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v11universal.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (PPC)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v11ppc.html

Trust: 0.8

title:Security Update 2007-004 v1.1 (10.3.9 Client)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2007004v111039client.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-000949

EXTERNAL IDS

db:NVDid:CVE-2006-6652

Trust: 2.9

db:USCERTid:TA07-109A

Trust: 2.6

db:SECUNIAid:24966

Trust: 2.6

db:SECTRACKid:1017386

Trust: 2.6

db:BIDid:21377

Trust: 2.1

db:OSVDBid:31781

Trust: 1.8

db:VUPENid:ADV-2007-1470

Trust: 1.8

db:SECUNIAid:23178

Trust: 1.8

db:SECUNIAid:23903

Trust: 0.9

db:BIDid:21975

Trust: 0.8

db:SECUNIAid:23701

Trust: 0.8

db:SECUNIAid:23706

Trust: 0.8

db:SECUNIAid:23667

Trust: 0.8

db:SECUNIAid:23690

Trust: 0.8

db:SECTRACKid:1017494

Trust: 0.8

db:CERT/CCid:VU#831452

Trust: 0.8

db:USCERTid:SA07-109A

Trust: 0.8

db:JVNDBid:JVNDB-2006-000949

Trust: 0.8

db:CNNVDid:CNNVD-200612-413

Trust: 0.7

db:CERT/CCid:TA07-109A

Trust: 0.6

db:NETBSDid:NETBSD-SA2006-027

Trust: 0.6

db:FULLDISCid:20061201 NETBSD FTPD AND PORTS ***REMOTE ROOOOOT HOLE***

Trust: 0.6

db:APPLEid:APPLE-SA-2007-04-19

Trust: 0.6

db:XFid:30670

Trust: 0.6

db:EXPLOIT-DBid:2874

Trust: 0.2

db:EXPLOIT-DBid:29204

Trust: 0.1

db:SEEBUGid:SSVID-82732

Trust: 0.1

db:VULHUBid:VHN-22760

Trust: 0.1

db:VULMONid:CVE-2006-6652

Trust: 0.1

db:PACKETSTORMid:53950

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-22760 // VULMON: CVE-2006-6652 // BID: 21377 // JVNDB: JVNDB-2006-000949 // PACKETSTORM: 53950 // CNNVD: CNNVD-200612-413 // NVD: CVE-2006-6652

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta07-109a.html

Trust: 2.6

url:http://securitytracker.com/id?1017386

Trust: 2.6

url:http://secunia.com/advisories/24966

Trust: 2.6

url:http://docs.info.apple.com/article.html?artnum=305391

Trust: 2.1

url:http://lists.apple.com/archives/security-announce/2007/apr/msg00001.html

Trust: 1.8

url:http://www.securityfocus.com/bid/21377

Trust: 1.8

url:http://lists.grok.org.uk/pipermail/full-disclosure/2006-december/051009.html

Trust: 1.8

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-027.txt.asc

Trust: 1.8

url:http://www.osvdb.org/31781

Trust: 1.8

url:http://secunia.com/advisories/23178

Trust: 1.8

url:http://www.frsirt.com/english/advisories/2007/1470

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/1470

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30670

Trust: 1.2

url:http://secunia.com/advisories/23903/

Trust: 0.9

url:http://secunia.com/advisories/23690/

Trust: 0.9

url:http://web.mit.edu/kerberos/www/advisories/mitkrb5-sa-2006-003-mechglue.txt

Trust: 0.8

url:http://web.mit.edu/kerberos/advisories/2006-003-patch.txt

Trust: 0.8

url:http://web.mit.edu/kerberos/advisories/2006-003-patch.txt.asc

Trust: 0.8

url:http://securitytracker.com/alerts/2007/jan/1017494.html

Trust: 0.8

url:http://www.securityfocus.com/bid/21975

Trust: 0.8

url:http://secunia.com/advisories/23706/

Trust: 0.8

url:http://secunia.com/advisories/23701/

Trust: 0.8

url:http://secunia.com/advisories/23667/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6652

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-109a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-109a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-6652

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-109a.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/30670

Trust: 0.6

url:http://www.netbsd.org/

Trust: 0.3

url:http://freshmeat.net/projects/tnftpd

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/apple-osx-ftpd-cve-2006-6652

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/2874/

Trust: 0.1

url:http://www.gentoo.org/security/en/glsa/glsa-200701-21.xml

Trust: 0.1

url:http://secunia.com/advisories/23696/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/product/339/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#831452 // VULHUB: VHN-22760 // VULMON: CVE-2006-6652 // BID: 21377 // JVNDB: JVNDB-2006-000949 // PACKETSTORM: 53950 // CNNVD: CNNVD-200612-413 // NVD: CVE-2006-6652

CREDITS

kcope is credited with the discovery of this vulnerability.

Trust: 0.3

sources: BID: 21377

SOURCES

db:CERT/CCid:VU#831452
db:VULHUBid:VHN-22760
db:VULMONid:CVE-2006-6652
db:BIDid:21377
db:JVNDBid:JVNDB-2006-000949
db:PACKETSTORMid:53950
db:CNNVDid:CNNVD-200612-413
db:NVDid:CVE-2006-6652

LAST UPDATE DATE

2025-04-30T21:17:46.534000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#831452date:2007-05-10T00:00:00
db:VULHUBid:VHN-22760date:2018-10-17T00:00:00
db:VULMONid:CVE-2006-6652date:2018-10-17T00:00:00
db:BIDid:21377date:2016-07-06T13:33:00
db:JVNDBid:JVNDB-2006-000949date:2007-05-17T00:00:00
db:CNNVDid:CNNVD-200612-413date:2007-08-07T00:00:00
db:NVDid:CVE-2006-6652date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#831452date:2007-01-09T00:00:00
db:VULHUBid:VHN-22760date:2006-12-20T00:00:00
db:VULMONid:CVE-2006-6652date:2006-12-20T00:00:00
db:BIDid:21377date:2006-12-01T00:00:00
db:JVNDBid:JVNDB-2006-000949date:2007-05-17T00:00:00
db:PACKETSTORMid:53950date:2007-01-27T01:46:45
db:CNNVDid:CNNVD-200612-413date:2006-12-19T00:00:00
db:NVDid:CVE-2006-6652date:2006-12-20T02:28:00