CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
99.7%
It was discovered that the libraries handling RPCSEC_GSS did not correctly
validate the size of certain packet structures. An unauthenticated remote
user could send a specially crafted request and execute arbitrary code
with root privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 7.04 | noarch | librpcsecgss3 | < 0.14-2ubuntu1.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | librpcsecgss-dev | < 0.14-2ubuntu1.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | libkadm55 | < 1.4.4-5ubuntu3.2 | UNKNOWN |
Ubuntu | 7.04 | noarch | krb5-admin-server | < 1.4.4-5ubuntu3.2 | UNKNOWN |
Ubuntu | 7.04 | noarch | krb5-clients | < 1.4.4-5ubuntu3.2 | UNKNOWN |
Ubuntu | 7.04 | noarch | krb5-ftpd | < 1.4.4-5ubuntu3.2 | UNKNOWN |
Ubuntu | 7.04 | noarch | krb5-kdc | < 1.4.4-5ubuntu3.2 | UNKNOWN |
Ubuntu | 7.04 | noarch | krb5-rsh-server | < 1.4.4-5ubuntu3.2 | UNKNOWN |
Ubuntu | 7.04 | noarch | krb5-telnetd | < 1.4.4-5ubuntu3.2 | UNKNOWN |
Ubuntu | 7.04 | noarch | krb5-user | < 1.4.4-5ubuntu3.2 | UNKNOWN |