Lucene search

K
osvGoogleOSV:DSA-1323-1
HistoryJun 28, 2007 - 12:00 a.m.

krb5

2007-06-2800:00:00
Google
osv.dev
9

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.971 High

EPSS

Percentile

99.6%

Several remote vulnerabilities have been discovered in the MIT reference
implementation of the Kerberos network authentication protocol suite,
which may lead to the execution of arbitrary code. The Common
Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2007-2442
    Wei Wang discovered that the free of an uninitialised pointer in the
    Kerberos RPC library may lead to the execution of arbitrary code.
  • CVE-2007-2443
    Wei Wang discovered that insufficient input sanitising in the
    Kerberos RPC library may lead to the execution of arbitrary code.
  • CVE-2007-2798
    It was discovered that a buffer overflow in the Kerberos
    administration daemon may lead to the execution of arbitrary code.

For the old stable distribution (sarge) these problems have been fixed in
version 1.3.6-2sarge5. Packages for hppa, mips and powerpc are not yet
available. They will be provided later.

For the stable distribution (etch) these problems have been fixed in
version 1.4.4-7etch2. Packages for hppa and mips are not yet available.
They will be provided later.

For the unstable distribution (sid) these problems have been fixed in
version 1.6.dfsg.1-5.

We recommend that you upgrade your Kerberos packages.

CPENameOperatorVersion
krb5eq1.4.4-7etch1

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.971 High

EPSS

Percentile

99.6%