ID |
CVE-2007-5902
|
Summary |
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 10.0 (as of 21-01-2020 - 15:44) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-189 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
refmap
via4
|
bid | 26750 | bugtraq | 20080319 rPSA-2008-0112-1 krb5 krb5-server krb5-services krb5-test krb5-workstation | confirm | | fulldisc | - 20071208 MIT Kerberos 5: Multiple vulnerabilities
- 20071208 Venustech reports of MIT krb5 vulns [CVE-2007-5894 CVE-2007-5901 CVE-2007-5902 CVE-2007-5971 CVE-2007-5972]
| misc | http://bugs.gentoo.org/show_bug.cgi?id=199214 | osvdb | 44748 | secunia | | suse | SUSE-SR:2008:002 | ubuntu | | vupen | ADV-2010-1192 |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2007-12-14 | organization | Red Hat | statement | This issue is not a practical vulnerability, for more information see http://marc.info/?m=119743235325151
|
|
Last major update |
21-01-2020 - 15:44 |
Published |
06-12-2007 - 02:46 |
Last modified |
21-01-2020 - 15:44 |