Логотип exploitDog
bind:"CVE-2007-3999" OR bind:"CVE-2007-4135"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2007-3999" OR bind:"CVE-2007-4135"

Количество 15

Количество 15

oracle-oval логотип

ELSA-2007-0951

больше 17 лет назад

ELSA-2007-0951: Important: nfs-utils-lib security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2007-4135

почти 18 лет назад

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle return values from the getpwnam_r function when performing a username lookup, which can cause it to report a file as being owned by "root" instead of "nobody" if the file exists on the server but not on the client.

CVSS2: 6.2
EPSS: Низкий
redhat логотип

CVE-2007-4135

почти 18 лет назад

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle return values from the getpwnam_r function when performing a username lookup, which can cause it to report a file as being owned by "root" instead of "nobody" if the file exists on the server but not on the client.

EPSS: Низкий
nvd логотип

CVE-2007-4135

почти 18 лет назад

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle return values from the getpwnam_r function when performing a username lookup, which can cause it to report a file as being owned by "root" instead of "nobody" if the file exists on the server but not on the client.

CVSS2: 6.2
EPSS: Низкий
debian логотип

CVE-2007-4135

почти 18 лет назад

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle re ...

CVSS2: 6.2
EPSS: Низкий
ubuntu логотип

CVE-2007-3999

почти 18 лет назад

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

CVSS2: 10
EPSS: Средний
redhat логотип

CVE-2007-3999

почти 18 лет назад

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

EPSS: Средний
nvd логотип

CVE-2007-3999

почти 18 лет назад

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

CVSS2: 10
EPSS: Средний
debian логотип

CVE-2007-3999

почти 18 лет назад

Stack-based buffer overflow in the svcauth_gss_validate function in li ...

CVSS2: 10
EPSS: Средний
github логотип

GHSA-rw5m-g76h-ww34

около 3 лет назад

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle return values from the getpwnam_r function when performing a username lookup, which can cause it to report a file as being owned by "root" instead of "nobody" if the file exists on the server but not on the client.

EPSS: Низкий
github логотип

GHSA-62qg-wq9p-p6p2

около 3 лет назад

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

EPSS: Средний
fstec логотип

BDU:2015-07450

почти 18 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 10
EPSS: Средний
fstec логотип

BDU:2015-07449

почти 18 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 10
EPSS: Средний
oracle-oval логотип

ELSA-2007-0858

почти 18 лет назад

ELSA-2007-0858: Important: krb5 security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2015-09590

почти 18 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2007-0951

ELSA-2007-0951: Important: nfs-utils-lib security update (IMPORTANT)

больше 17 лет назад
ubuntu логотип
CVE-2007-4135

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle return values from the getpwnam_r function when performing a username lookup, which can cause it to report a file as being owned by "root" instead of "nobody" if the file exists on the server but not on the client.

CVSS2: 6.2
0%
Низкий
почти 18 лет назад
redhat логотип
CVE-2007-4135

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle return values from the getpwnam_r function when performing a username lookup, which can cause it to report a file as being owned by "root" instead of "nobody" if the file exists on the server but not on the client.

0%
Низкий
почти 18 лет назад
nvd логотип
CVE-2007-4135

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle return values from the getpwnam_r function when performing a username lookup, which can cause it to report a file as being owned by "root" instead of "nobody" if the file exists on the server but not on the client.

CVSS2: 6.2
0%
Низкий
почти 18 лет назад
debian логотип
CVE-2007-4135

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle re ...

CVSS2: 6.2
0%
Низкий
почти 18 лет назад
ubuntu логотип
CVE-2007-3999

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

CVSS2: 10
30%
Средний
почти 18 лет назад
redhat логотип
CVE-2007-3999

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

30%
Средний
почти 18 лет назад
nvd логотип
CVE-2007-3999

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

CVSS2: 10
30%
Средний
почти 18 лет назад
debian логотип
CVE-2007-3999

Stack-based buffer overflow in the svcauth_gss_validate function in li ...

CVSS2: 10
30%
Средний
почти 18 лет назад
github логотип
GHSA-rw5m-g76h-ww34

The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle return values from the getpwnam_r function when performing a username lookup, which can cause it to report a file as being owned by "root" instead of "nobody" if the file exists on the server but not on the client.

0%
Низкий
около 3 лет назад
github логотип
GHSA-62qg-wq9p-p6p2

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

30%
Средний
около 3 лет назад
fstec логотип
BDU:2015-07450

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 10
30%
Средний
почти 18 лет назад
fstec логотип
BDU:2015-07449

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 10
30%
Средний
почти 18 лет назад
oracle-oval логотип
ELSA-2007-0858

ELSA-2007-0858: Important: krb5 security update (IMPORTANT)

почти 18 лет назад
fstec логотип
BDU:2015-09590

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 10
почти 18 лет назад

Уязвимостей на страницу