ID CVE-2007-5902
Summary Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
References
Vulnerable Configurations
  • cpe:2.3:a:mit:kerberos:5:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:5:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 15-10-2018 - 21:47)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 26750
bugtraq 20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation
confirm
fulldisc
  • 20071208 MIT Kerberos 5: Multiple vulnerabilities
  • 20071208 Venustech reports of MIT krb5 vulns [CVE-2007-5894 CVE-2007-5901 CVE-2007-5902 CVE-2007-5971 CVE-2007-5972]
misc http://bugs.gentoo.org/show_bug.cgi?id=199214
osvdb 44748
secunia
  • 28636
  • 29457
  • 39290
  • 39784
suse SUSE-SR:2008:002
ubuntu
  • USN-924-1
  • USN-940-1
vupen ADV-2010-1192
statements via4
contributor Mark J Cox
lastmodified 2007-12-14
organization Red Hat
statement This issue is not a practical vulnerability, for more information see http://marc.info/?m=119743235325151
Last major update 15-10-2018 - 21:47
Published 06-12-2007 - 02:46
Back to Top