7.4
CVSSv2

CVE-2007-2798

Published: 26/06/2007 Updated: 21/01/2020
CVSS v2 Base Score: 7.4 | Impact Score: 10 | Exploitability Score: 4.4
VMScore: 659
Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos

mit kerberos 5 -

mit kerberos 5 1.1

mit kerberos 5 1.2

mit kerberos 5 1.2.1

mit kerberos 5 1.2.2

mit kerberos 5 1.2.3

mit kerberos 5 1.2.4

mit kerberos 5 1.2.5

mit kerberos 5 1.2.6

mit kerberos 5 1.2.7

mit kerberos 5 1.2.8

mit kerberos 5 1.3

mit kerberos 5 1.3.1

mit kerberos 5 1.3.2

mit kerberos 5 1.3.3

mit kerberos 5 1.3.4

mit kerberos 5 1.3.5

mit kerberos 5 1.3.6

mit kerberos 5 1.4

mit kerberos 5 1.4.1

mit kerberos 5 1.4.2

mit kerberos 5 1.4.3

mit kerberos 5 1.4.4

mit kerberos 5 1.5

mit kerberos 5 1.5.1

mit kerberos 5 1.5.2

mit kerberos 5 1.5.3

mit kerberos 5 1.6

Vendor Advisories

Debian Bug report logs - #430785 CVE-2007-2798: kadmind vulnerable to buffer overflow Package: krb5-admin-server; Maintainer for krb5-admin-server is Sam Hartman <hartmans@debianorg>; Source for krb5-admin-server is src:krb5 (PTS, buildd, popcon) Reported by: Dominic Hargreaves <dom@earthli> Date: Wed, 27 Jun 2007 ...
Debian Bug report logs - #430787 krb5-admin-server: CVE-2007-2442, CVE-2007-2443: kadmind affected by multiple RPC library vulnerabilities Package: krb5-admin-server; Maintainer for krb5-admin-server is Sam Hartman <hartmans@debianorg>; Source for krb5-admin-server is src:krb5 (PTS, buildd, popcon) Reported by: Dominic Harg ...
Wei Wang discovered that the krb5 RPC library did not correctly handle certain error conditions A remote attacker could cause kadmind to free an uninitialized pointer, leading to a denial of service or possibly execution of arbitrary code with root privileges (CVE-2007-2442) ...
Several remote vulnerabilities have been discovered in the MIT reference implementation of the Kerberos network authentication protocol suite, which may lead to the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2442 Wei Wang discovered that the free of an uninitialised ...

References

CWE-119ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.aschttp://docs.info.apple.com/article.html?artnum=306172http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=548http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlhttp://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.htmlhttp://osvdb.org/36595http://secunia.com/advisories/25800http://secunia.com/advisories/25801http://secunia.com/advisories/25814http://secunia.com/advisories/25821http://secunia.com/advisories/25870http://secunia.com/advisories/25875http://secunia.com/advisories/25888http://secunia.com/advisories/25890http://secunia.com/advisories/25894http://secunia.com/advisories/25911http://secunia.com/advisories/26033http://secunia.com/advisories/26228http://secunia.com/advisories/26235http://secunia.com/advisories/26909http://secunia.com/advisories/27706http://secunia.com/advisories/40346http://security.gentoo.org/glsa/glsa-200707-11.xmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102985-1http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txthttp://www.debian.org/security/2007/dsa-1323http://www.kb.cert.org/vuls/id/554257http://www.mandriva.com/security/advisories?name=MDKSA-2007:137http://www.novell.com/linux/security/advisories/2007_38_krb5.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0384.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0562.htmlhttp://www.securityfocus.com/archive/1/472289/100/0/threadedhttp://www.securityfocus.com/archive/1/472432/100/0/threadedhttp://www.securityfocus.com/archive/1/472507/30/5970/threadedhttp://www.securityfocus.com/bid/24653http://www.securityfocus.com/bid/25159http://www.securitytracker.com/id?1018295http://www.trustix.org/errata/2007/0021/http://www.ubuntu.com/usn/usn-477-1http://www.us-cert.gov/cas/techalerts/TA07-177A.htmlhttp://www.vupen.com/english/advisories/2007/2337http://www.vupen.com/english/advisories/2007/2370http://www.vupen.com/english/advisories/2007/2491http://www.vupen.com/english/advisories/2007/2732http://www.vupen.com/english/advisories/2007/3229http://www.vupen.com/english/advisories/2010/1574https://exchange.xforce.ibmcloud.com/vulnerabilities/35080https://issues.rpath.com/browse/RPL-1499https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1726https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7550https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9996https://secure-support.novell.com/KanisaPlatform/Publishing/327/3675615_f.SAL_Public.htmlhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430785https://nvd.nist.govhttps://usn.ubuntu.com/477-1/https://www.rapid7.com/db/vulnerabilities/sunpatch-112925https://www.kb.cert.org/vuls/id/554257