First published: Mon Aug 06 2007(Updated: )
Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | =1.4 | |
MIT Kerberos 5 | =1.4.1 | |
MIT Kerberos 5 | =1.4.2 | |
MIT Kerberos 5 | =1.4.3 | |
MIT Kerberos 5 | =1.4.4 | |
MIT Kerberos 5 | =1.5 | |
MIT Kerberos 5 | =1.5.1 | |
MIT Kerberos 5 | =1.5.2 | |
MIT Kerberos 5 | =1.5.3 | |
MIT Kerberos 5 | =1.6 | |
MIT Kerberos 5 | =1.6.1 | |
MIT Kerberos 5 | =1.6.2 | |
redhat/0.1.7 | <15. | 15. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)