[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-4743

Date: (C)2007-09-06   (M)2017-10-04
 
CVSS Score: 10.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

Reference:
http://www.securityfocus.com/archive/1/archive/1/478748/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/478794/100/0/threaded
BID-26444
SECUNIA-26699
SECUNIA-26987
SECUNIA-27643
ADV-2007-3868
APPLE-SA-2007-11-14
DSA-1387
IAVM:2007-T-0037
RHSA-2007:0892
SUSE-SR:2007:019
TA07-319A
USN-511-2
http://article.gmane.org/gmane.comp.encryption.kerberos.announce/86
http://docs.info.apple.com/article.html?artnum=307041
https://issues.rpath.com/browse/RPL-1696

CPE    12
cpe:/a:mit:kerberos:5-1.6.2
cpe:/a:mit:kerberos:5-1.4
cpe:/a:mit:kerberos:5-1.4.1
cpe:/a:mit:kerberos:5-1.4.3
...
CWE    1
CWE-119

© 2013 SecPod Technologies