First published: Fri Apr 06 2007(Updated: )
Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | <1.6.1 | |
Ubuntu Linux | =5.10 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =6.10 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =4.0 | |
Ubuntu | =6.10 | |
Ubuntu | =5.10 | |
Ubuntu | =6.06 | |
Debian | =3.1 | |
Debian | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1216 is classified as a critical vulnerability that can lead to remote code execution.
To mitigate CVE-2007-1216, update your MIT Kerberos 5 to version 1.6.1 or later.
CVE-2007-1216 affects MIT Kerberos 5 versions prior to 1.6.1 and certain versions of Ubuntu and Debian.
Yes, CVE-2007-1216 allows remote authenticated users to execute arbitrary code.
Disabling the GSS-API functionality or restricting access to the affected services can serve as a temporary workaround for CVE-2007-1216.