Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-3999

Опубликовано: 05 сент. 2007
Источник: ubuntu
Приоритет: untriaged
CVSS2: 10

Описание

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

РелизСтатусПримечание
dapper

released

1.4.3-5ubuntu0.6
devel

not-affected

edgy

released

1.4.3-9ubuntu1.5
feisty

released

1.4.4-5ubuntu3.3
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

0.7-0ubuntu1.2
devel

released

0.14-2ubuntu3
edgy

released

0.13-2ubuntu0.2
feisty

released

0.14-2ubuntu1.2
upstream

needs-triage

Показывать по

10 Critical

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

nvd
почти 18 лет назад

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

debian
почти 18 лет назад

Stack-based buffer overflow in the svcauth_gss_validate function in li ...

github
около 3 лет назад

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

fstec
почти 18 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

10 Critical

CVSS2