10
CVSSv2

CVE-2007-4743

Published: 06/09/2007 Updated: 21/01/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 up to and including 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote malicious users to conduct a buffer overflow attack.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5 1.4.1

mit kerberos 5 1.4.2

mit kerberos 5 1.6

mit kerberos 5 1.6.1

mit kerberos 5 1.4

mit kerberos 5 1.5.2

mit kerberos 5 1.5.3

mit kerberos 5 1.4.3

mit kerberos 5 1.4.4

mit kerberos 5 1.6.2

mit kerberos 5 1.5

mit kerberos 5 1.5.1

Vendor Advisories

Debian Bug report logs - #441209 CVE-2007-4743 Incorrect fix for CVE-2007-3999 Package: krb5; Maintainer for krb5 is Sam Hartman <hartmans@debianorg>; Reported by: Nico Golde <nion@debianorg> Date: Fri, 7 Sep 2007 13:06:01 UTC Severity: grave Tags: security Found in version 16dfsg1-7 Done: Nico Golde <nion ...
USN-511-1 fixed vulnerabilities in krb5 and librpcsecgss The fixes were incomplete, and only reduced the scope of the vulnerability, without fully solving it This update fixes the problem ...
It has been discovered that the original patch for a buffer overflow in svc_auth_gssc in the RPCSEC_GSS RPC library in MIT Kerberos 5 (CVE-2007-3999, DSA-1368-1) was insufficient to protect from arbitrary code execution in some environments The old stable distribution (sarge) does not contain a librpcsecgss package For the stable distribution (e ...