First published: Thu Dec 06 2007(Updated: )
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 Application |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5902 has a moderate severity level due to potential remote exploitation risks.
To fix CVE-2007-5902, update to the latest version of MIT Kerberos 5 that addresses this vulnerability.
CVE-2007-5902 is an integer overflow vulnerability affecting the svcauth_gss_get_principal function.
Users of MIT Kerberos 5 who allow remote RPC requests may be affected by CVE-2007-5902.
Attackers may exploit CVE-2007-5902 to cause unknown impacts through crafted RPC requests.