First published: Thu Dec 06 2007(Updated: )
Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.4.11 | |
Apple iOS and macOS | =10.5.2 | |
Apple macOS Server | =10.4.11 | |
Apple macOS Server | =10.5.2 | |
MIT Kerberos 5 Application | <=1.6.3_kdc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-5971 is currently unknown as it involves a double free vulnerability with unspecified impact and attack vectors.
CVE-2007-5971 affects MIT Kerberos 5 versions up to and including 1.6.3_kdc.
To fix CVE-2007-5971, update to a version of MIT Kerberos 5 that is beyond 1.6.3_kdc.
The specific attack vectors for CVE-2007-5971 are not defined, making it unclear if it can be exploited remotely.
The consequences of CVE-2007-5971 remain unspecified due to the lack of detail on its impact and exploitation scenarios.