Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4743

Опубликовано: 06 сент. 2007
Источник: ubuntu
Приоритет: untriaged
EPSS Средний
CVSS2: 10

Описание

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

РелизСтатусПримечание
dapper

released

1.4.3-5ubuntu0.6
devel

not-affected

edgy

released

1.4.3-9ubuntu1.5
feisty

released

1.4.4-5ubuntu3.3
upstream

released

1.5.5, 1.6.3

Показывать по

РелизСтатусПримечание
dapper

released

0.7-0ubuntu1.2
devel

released

0.14-2ubuntu4
edgy

released

0.13-2ubuntu0.2
feisty

released

0.14-2ubuntu1.2
upstream

released

0.16

Показывать по

EPSS

Процентиль: 95%
0.22269
Средний

10 Critical

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

nvd
почти 18 лет назад

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

debian
почти 18 лет назад

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_G ...

github
около 3 лет назад

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

oracle-oval
почти 18 лет назад

ELSA-2007-0892: Important: krb5 security update (IMPORTANT)

EPSS

Процентиль: 95%
0.22269
Средний

10 Critical

CVSS2