Computer Security
[EN] securityvulns.ru no-pyccku


MIT Kerberos buffer overflow
updated since 06.09.2007
Published:13.09.2007
Source:
SecurityVulns ID:8119
Type:library
Threat Level:
7/10
Description:Buffer overflow on oversized string in RPC library svcauth_gss_validate() function.
Affected:MIT : krb5 1.6
CVE:CVE-2007-3999 (Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and possibly third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.)
Original documentdocumentZDI, ZDI-07-052: Multiple Kerberos Implementations Authentication Context Stack Overflow Vulnerability (13.09.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod