9
CVSSv2

CVE-2007-2798

Published: 26/06/2007 Updated: 02/02/2021
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5

canonical ubuntu linux 6.06

canonical ubuntu linux 6.10

canonical ubuntu linux 7.04

debian debian linux 3.1

debian debian linux 4.0

Vendor Advisories

Wei Wang discovered that the krb5 RPC library did not correctly handle certain error conditions A remote attacker could cause kadmind to free an uninitialized pointer, leading to a denial of service or possibly execution of arbitrary code with root privileges (CVE-2007-2442) ...
Debian Bug report logs - #430787 krb5-admin-server: CVE-2007-2442, CVE-2007-2443: kadmind affected by multiple RPC library vulnerabilities Package: krb5-admin-server; Maintainer for krb5-admin-server is Sam Hartman <hartmans@debianorg>; Source for krb5-admin-server is src:krb5 (PTS, buildd, popcon) Reported by: Dominic Harg ...
Debian Bug report logs - #430785 CVE-2007-2798: kadmind vulnerable to buffer overflow Package: krb5-admin-server; Maintainer for krb5-admin-server is Sam Hartman <hartmans@debianorg>; Source for krb5-admin-server is src:krb5 (PTS, buildd, popcon) Reported by: Dominic Hargreaves <dom@earthli> Date: Wed, 27 Jun 2007 ...
Several remote vulnerabilities have been discovered in the MIT reference implementation of the Kerberos network authentication protocol suite, which may lead to the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-2442 Wei Wang discovered that the free of an uninitialised ...

References

CWE-787http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=548http://www.us-cert.gov/cas/techalerts/TA07-177A.htmlhttp://www.kb.cert.org/vuls/id/554257http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.htmlhttp://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txthttps://issues.rpath.com/browse/RPL-1499https://secure-support.novell.com/KanisaPlatform/Publishing/327/3675615_f.SAL_Public.htmlhttp://docs.info.apple.com/article.html?artnum=306172http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlhttp://www.debian.org/security/2007/dsa-1323http://security.gentoo.org/glsa/glsa-200707-11.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:137http://www.redhat.com/support/errata/RHSA-2007-0384.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0562.htmlftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.aschttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102985-1http://www.novell.com/linux/security/advisories/2007_38_krb5.htmlhttp://www.trustix.org/errata/2007/0021/http://www.ubuntu.com/usn/usn-477-1http://www.securityfocus.com/bid/24653http://www.securityfocus.com/bid/25159http://www.securitytracker.com/id?1018295http://secunia.com/advisories/25821http://secunia.com/advisories/25870http://secunia.com/advisories/25875http://secunia.com/advisories/25890http://secunia.com/advisories/25894http://secunia.com/advisories/25800http://secunia.com/advisories/25801http://secunia.com/advisories/25814http://secunia.com/advisories/25888http://secunia.com/advisories/25911http://secunia.com/advisories/26228http://secunia.com/advisories/26235http://secunia.com/advisories/26033http://secunia.com/advisories/26909http://secunia.com/advisories/27706http://www.vupen.com/english/advisories/2010/1574http://secunia.com/advisories/40346http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427http://www.vupen.com/english/advisories/2007/3229http://www.vupen.com/english/advisories/2007/2370http://www.vupen.com/english/advisories/2007/2491http://www.vupen.com/english/advisories/2007/2732http://www.vupen.com/english/advisories/2007/2337http://osvdb.org/36595https://exchange.xforce.ibmcloud.com/vulnerabilities/35080https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9996https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7550https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1726http://www.securityfocus.com/archive/1/472507/30/5970/threadedhttp://www.securityfocus.com/archive/1/472432/100/0/threadedhttp://www.securityfocus.com/archive/1/472289/100/0/threadedhttps://usn.ubuntu.com/477-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/554257