Computer Security
[EN] securityvulns.ru no-pyccku


MIT Kerberos multiple security vulnerabilities
updated since 26.06.2007
Published:27.06.2007
Source:
SecurityVulns ID:7854
Type:remote
Threat Level:
6/10
Description:kadmind stack-based buffer overflow, buffer overflow and uninitialized pointer free() in RPC library.
Affected:MIT : krb5 1.6
CVE:CVE-2007-2798 (Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.)
 CVE-2007-2443 (Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.)
 CVE-2007-2442 (The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.)
Original documentdocumentIDEFENSE, iDefense Security Advisory 06.26.07: Multiple Vendor Kerberos kadmind Rename Principal Buffer Overflow Vulnerability (26.06.2007)
 documentMIT, MITKRB5-SA-2007-005: kadmind vulnerable to buffer overflow (26.06.2007)
 documentMIT, MITKRB5-SA-2007-004: kadmind multiple RPC lib vulnerabilities (26.06.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod