Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4000

Опубликовано: 05 сент. 2007
Источник: ubuntu
Приоритет: medium
CVSS2: 8.5

Описание

The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.

РелизСтатусПримечание
dapper

not-affected

devel

released

1.6.dfsg.1-7
edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

8.5 High

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.

nvd
почти 18 лет назад

The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.

debian
почти 18 лет назад

The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy. ...

github
больше 3 лет назад

The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the "modify policy" privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.

oracle-oval
почти 18 лет назад

ELSA-2007-0858: Important: krb5 security update (IMPORTANT)

8.5 High

CVSS2