Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4743

Опубликовано: 06 сент. 2007
Источник: ubuntu
Приоритет: medium
CVSS2: 10

Описание

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

РелизСтатусПримечание
dapper

released

1.4.3-5ubuntu0.6
devel

not-affected

edgy

released

1.4.3-9ubuntu1.5
feisty

released

1.4.4-5ubuntu3.3
upstream

released

1.5.5, 1.6.3

Показывать по

РелизСтатусПримечание
dapper

released

0.7-0ubuntu1.2
devel

released

0.14-2ubuntu4
edgy

released

0.13-2ubuntu0.2
feisty

released

0.14-2ubuntu1.2
upstream

released

0.16

Показывать по

10 Critical

CVSS2

Связанные уязвимости

redhat
больше 18 лет назад

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

nvd
больше 18 лет назад

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

debian
больше 18 лет назад

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_G ...

github
почти 4 года назад

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

oracle-oval
больше 18 лет назад

ELSA-2007-0892: Important: krb5 security update (IMPORTANT)

10 Critical

CVSS2