10

CVE-2007-2442

The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MitKerberos 5 Version <= 1.6.1
DebianDebian Linux Version3.1
DebianDebian Linux Version4.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version6.10
CanonicalUbuntu Linux Version7.04
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 42.57% 0.974
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-824 Access of Uninitialized Pointer

The product accesses or uses a pointer that has not been initialized.

http://secunia.com/advisories/25894
Third Party Advisory
Broken Link
http://secunia.com/advisories/26909
Third Party Advisory
Broken Link
http://secunia.com/advisories/27706
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2007/3229
Third Party Advisory
Broken Link
http://secunia.com/advisories/26235
Third Party Advisory
Broken Link
http://www.securityfocus.com/bid/25159
Third Party Advisory
Broken Link
VDB Entry
http://www.vupen.com/english/advisories/2007/2732
Third Party Advisory
Broken Link
http://secunia.com/advisories/25800
Third Party Advisory
Broken Link
http://secunia.com/advisories/25801
Third Party Advisory
Broken Link
http://secunia.com/advisories/25814
Third Party Advisory
Broken Link
http://secunia.com/advisories/25821
Third Party Advisory
Broken Link
http://secunia.com/advisories/25841
Third Party Advisory
Broken Link
http://secunia.com/advisories/25870
Third Party Advisory
Broken Link
http://secunia.com/advisories/25888
Third Party Advisory
Broken Link
http://secunia.com/advisories/25890
Third Party Advisory
Broken Link
http://secunia.com/advisories/25911
Third Party Advisory
Broken Link
http://secunia.com/advisories/26033
Third Party Advisory
Broken Link
http://secunia.com/advisories/26228
Third Party Advisory
Broken Link
http://secunia.com/advisories/40346
Third Party Advisory
Broken Link
http://www.kb.cert.org/vuls/id/356961
Patch
Third Party Advisory
US Government Resource
http://www.securityfocus.com/archive/1/472288/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/archive/1/472432/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/archive/1/472507/30/5970/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/24655
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1018293
Third Party Advisory
Broken Link
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-177A.html
Patch
Third Party Advisory
US Government Resource
Broken Link
http://www.vupen.com/english/advisories/2007/2337
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2007/2354
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2007/2491
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2010/1574
Third Party Advisory
Broken Link