Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-5902

Опубликовано: 06 дек. 2007
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 10

Описание

Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.

РелизСтатусПримечание
dapper

released

1.4.3-5ubuntu0.11
devel

not-affected

edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

1.6.dfsg.3~beta1-2ubuntu1.4
intrepid

not-affected

jaunty

not-affected

karmic

not-affected

lucid

not-affected

Показывать по

EPSS

Процентиль: 88%
0.04002
Низкий

10 Critical

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.

nvd
почти 18 лет назад

Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.

debian
почти 18 лет назад

Integer overflow in the svcauth_gss_get_principal function in lib/rpc/ ...

github
больше 3 лет назад

Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.

EPSS

Процентиль: 88%
0.04002
Низкий

10 Critical

CVSS2