Описание
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 1.4.3-5ubuntu0.6 |
| devel | released | 1.6.dfsg.1-7 |
| edgy | released | 1.4.3-9ubuntu1.5 |
| feisty | released | 1.4.4-5ubuntu3.3 |
| upstream | needs-triage |
Показывать по
10 Critical
CVSS2
Связанные уязвимости
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos ...
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
ELSA-2007-0562: Important: krb5 security update (IMPORTANT)
10 Critical
CVSS2