Lucene search

K
nvd[email protected]NVD:CVE-2007-4743
HistorySep 06, 2007 - 10:17 p.m.

CVE-2007-4743

2007-09-0622:17:00
CWE-119
web.nvd.nist.gov

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7 High

AI Score

Confidence

Low

0.967 High

EPSS

Percentile

99.7%

The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.

Affected configurations

NVD
Node
mitkerberos_5Match1.4
OR
mitkerberos_5Match1.4.1
OR
mitkerberos_5Match1.4.2
OR
mitkerberos_5Match1.4.3
OR
mitkerberos_5Match1.4.4
OR
mitkerberos_5Match1.5
OR
mitkerberos_5Match1.5.1
OR
mitkerberos_5Match1.5.2
OR
mitkerberos_5Match1.5.3
OR
mitkerberos_5Match1.6
OR
mitkerberos_5Match1.6.1
OR
mitkerberos_5Match1.6.2

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7 High

AI Score

Confidence

Low

0.967 High

EPSS

Percentile

99.7%