10
CVSSv2

CVE-2007-5902

Published: 06/12/2007 Updated: 21/01/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote malicious users to have an unknown impact via a large length value for a GSS client name in an RPC request.

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5 -

Vendor Advisories

Debian Bug report logs - #454974 krb5: Venustech AD-LAB CVEs (not serious) Package: krb5; Maintainer for krb5 is Sam Hartman <hartmans@debianorg>; Reported by: Nico Golde <nion@debianorg> Date: Sat, 8 Dec 2007 14:24:02 UTC Severity: normal Tags: fixed-upstream, upstream Found in version 117-1 Fixed in version k ...
Unauthenticated remote attackers could cause Kerberos servers to crash, leading to a denial of service ...
Sol Jerome discovered that the Kerberos kadmind service did not correctly free memory An unauthenticated remote attacker could send specially crafted traffic to crash the kadmind process, leading to a denial of service (CVE-2010-0629) ...