Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-2798

Опубликовано: 26 июн. 2007
Источник: debian
EPSS Средний

Описание

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
krb5fixed1.6.dfsg.1-5package

EPSS

Процентиль: 94%
0.1489
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

redhat
больше 18 лет назад

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

nvd
больше 18 лет назад

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

github
больше 3 лет назад

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

oracle-oval
больше 18 лет назад

ELSA-2007-0562: Important: krb5 security update (IMPORTANT)

EPSS

Процентиль: 94%
0.1489
Средний