First published: Tue Jun 26 2007(Updated: )
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | <=1.6.1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =6.10 | |
Ubuntu Linux | =7.04 | |
Debian | =3.1 | |
Debian | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =7.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2442 has a medium severity level due to the potential for remote code execution.
To fix CVE-2007-2442, upgrade to MIT Kerberos 5 version 1.6.2 or later.
CVE-2007-2442 affects MIT Kerberos 5 version 1.6.1 and earlier, as well as specific versions of Debian and Ubuntu Linux.
CVE-2007-2442 is a remote code execution vulnerability in the RPC library of MIT Kerberos 5.
Remote attackers can exploit CVE-2007-2442 using a zero-length RPC credential.