First published: Mon Aug 06 2007(Updated: )
Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/0.1.7 | <15. | 15. |
MIT Kerberos 5 Application | =1.4 | |
MIT Kerberos 5 Application | =1.4.1 | |
MIT Kerberos 5 Application | =1.4.2 | |
MIT Kerberos 5 Application | =1.4.3 | |
MIT Kerberos 5 Application | =1.4.4 | |
MIT Kerberos 5 Application | =1.5 | |
MIT Kerberos 5 Application | =1.5.1 | |
MIT Kerberos 5 Application | =1.5.2 | |
MIT Kerberos 5 Application | =1.5.3 | |
MIT Kerberos 5 Application | =1.6 | |
MIT Kerberos 5 Application | =1.6.1 | |
MIT Kerberos 5 Application | =1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2007-3999 is classified as a high severity vulnerability due to its potential for remote exploitation via a stack-based buffer overflow.
To fix CVE-2007-3999, update to a patched version of MIT Kerberos 5 beyond 1.6.2 or apply relevant security patches provided by your distribution.
CVE-2007-3999 affects MIT Kerberos 5 versions 1.4 through 1.6.2.
Systems running MIT Kerberos 5 versions 1.4 to 1.6.2, especially those using the RPCSEC_GSS library, are likely to be impacted.
Yes, CVE-2007-3999 is exploitable remotely due to the nature of the buffer overflow vulnerability.