[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-5902

Date: (C)2007-12-05   (M)2015-12-16
 
CVSS Score: 10.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.

Reference:
http://seclists.org/fulldisclosure/2007/Dec/0176.html
http://seclists.org/fulldisclosure/2007/Dec/0321.html
http://www.securityfocus.com/archive/1/archive/1/489883/100/0/threaded
BID-26750
SECUNIA-28636
SECUNIA-29457
SECUNIA-39290
SECUNIA-39784
OSVDB-44748
ADV-2010-1192
SUSE-SR:2008:002
USN-924-1
USN-940-1
http://bugs.gentoo.org/show_bug.cgi?id=199214
http://wiki.rpath.com/Advisories:rPSA-2008-0112
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112
https://issues.rpath.com/browse/RPL-2012

CPE    1
cpe:/a:mit:kerberos:5
CWE    1
CWE-189
OVAL    2
oval:org.secpod.oval:def:700183
oval:org.secpod.oval:def:700180

© 2013 SecPod Technologies