10

CVE-2007-2442

The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MitKerberos 5 Version <= 1.6.1
DebianDebian Linux Version3.1
DebianDebian Linux Version4.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version6.10
CanonicalUbuntu Linux Version7.04
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 39.32% 0.969
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-824 Access of Uninitialized Pointer

The product accesses or uses a pointer that has not been initialized.

http://secunia.com/advisories/25894
Third Party Advisory
Broken Link
http://secunia.com/advisories/26909
Third Party Advisory
Broken Link
http://secunia.com/advisories/27706
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2007/3229
Third Party Advisory
Broken Link
http://secunia.com/advisories/26235
Third Party Advisory
Broken Link
http://www.securityfocus.com/bid/25159
Third Party Advisory
Broken Link
VDB Entry
http://www.vupen.com/english/advisories/2007/2732
Third Party Advisory
Broken Link
http://secunia.com/advisories/25800
Third Party Advisory
Broken Link
http://secunia.com/advisories/25801
Third Party Advisory
Broken Link
http://secunia.com/advisories/25814
Third Party Advisory
Broken Link
http://secunia.com/advisories/25821
Third Party Advisory
Broken Link
http://secunia.com/advisories/25841
Third Party Advisory
Broken Link
http://secunia.com/advisories/25870
Third Party Advisory
Broken Link
http://secunia.com/advisories/25888
Third Party Advisory
Broken Link
http://secunia.com/advisories/25890
Third Party Advisory
Broken Link
http://secunia.com/advisories/25911
Third Party Advisory
Broken Link
http://secunia.com/advisories/26033
Third Party Advisory
Broken Link
http://secunia.com/advisories/26228
Third Party Advisory
Broken Link
http://secunia.com/advisories/40346
Third Party Advisory
Broken Link
http://www.kb.cert.org/vuls/id/356961
Patch
Third Party Advisory
US Government Resource
http://www.securityfocus.com/archive/1/472288/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/archive/1/472432/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/archive/1/472507/30/5970/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/24655
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1018293
Third Party Advisory
Broken Link
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA07-177A.html
Patch
Third Party Advisory
US Government Resource
Broken Link
http://www.vupen.com/english/advisories/2007/2337
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2007/2354
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2007/2491
Third Party Advisory
Broken Link
http://www.vupen.com/english/advisories/2010/1574
Third Party Advisory
Broken Link