8.3
CVSSv2

CVE-2007-2443

Published: 26/06/2007 Updated: 02/02/2021
CVSS v2 Base Score: 8.3 | Impact Score: 10 | Exploitability Score: 6.5
VMScore: 739
Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and previous versions might allow remote malicious users to execute arbitrary code via a negative length value.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5

debian debian linux 3.1

debian debian linux 4.0

canonical ubuntu linux 6.06

canonical ubuntu linux 6.10

canonical ubuntu linux 7.04

Vendor Advisories

Debian Bug report logs - #430787 krb5-admin-server: CVE-2007-2442, CVE-2007-2443: kadmind affected by multiple RPC library vulnerabilities Package: krb5-admin-server; Maintainer for krb5-admin-server is Sam Hartman <hartmans@debianorg>; Source for krb5-admin-server is src:krb5 (PTS, buildd, popcon) Reported by: Dominic Harg ...
Wei Wang discovered that the krb5 RPC library did not correctly handle certain error conditions A remote attacker could cause kadmind to free an uninitialized pointer, leading to a denial of service or possibly execution of arbitrary code with root privileges (CVE-2007-2442) ...
Several remote vulnerabilities have been discovered in the MIT reference implementation of the Kerberos network authentication protocol suite, which may lead to the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2442 Wei Wang discovered that the free of an uninitialised ...

References

NVD-CWE-Otherhttp://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txthttp://www.us-cert.gov/cas/techalerts/TA07-177A.htmlhttp://www.kb.cert.org/vuls/id/365313http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.htmlhttp://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txthttps://issues.rpath.com/browse/RPL-1499https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.htmlhttp://docs.info.apple.com/article.html?artnum=306172http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlhttp://www.debian.org/security/2007/dsa-1323http://security.gentoo.org/glsa/glsa-200707-11.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:137http://www.redhat.com/support/errata/RHSA-2007-0384.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0562.htmlftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.aschttp://www.novell.com/linux/security/advisories/2007_38_krb5.htmlhttp://www.trustix.org/errata/2007/0021/http://www.ubuntu.com/usn/usn-477-1http://www.securityfocus.com/bid/24657http://www.securityfocus.com/bid/25159http://www.securitytracker.com/id?1018293http://secunia.com/advisories/25821http://secunia.com/advisories/25870http://secunia.com/advisories/25890http://secunia.com/advisories/25894http://secunia.com/advisories/25800http://secunia.com/advisories/25801http://secunia.com/advisories/25814http://secunia.com/advisories/25888http://secunia.com/advisories/25911http://secunia.com/advisories/26228http://secunia.com/advisories/26235http://secunia.com/advisories/26033http://secunia.com/advisories/26909http://secunia.com/advisories/27706http://secunia.com/advisories/40346http://www.vupen.com/english/advisories/2010/1574http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427http://www.vupen.com/english/advisories/2007/2491http://www.vupen.com/english/advisories/2007/2732http://www.vupen.com/english/advisories/2007/3229http://www.vupen.com/english/advisories/2007/2337http://osvdb.org/36597https://exchange.xforce.ibmcloud.com/vulnerabilities/35085https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7131https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11277http://www.securityfocus.com/archive/1/472507/30/5970/threadedhttp://www.securityfocus.com/archive/1/472432/100/0/threadedhttp://www.securityfocus.com/archive/1/472288/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430787https://usn.ubuntu.com/477-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/365313