Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2007-3999


Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.


Published

2007-09-05T10:17:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 10.0 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mit kerberos_5 1.4 Yes
Application mit kerberos_5 1.4.1 Yes
Application mit kerberos_5 1.4.2 Yes
Application mit kerberos_5 1.4.3 Yes
Application mit kerberos_5 1.4.4 Yes
Application mit kerberos_5 1.5 Yes
Application mit kerberos_5 1.5.1 Yes
Application mit kerberos_5 1.5.2 Yes
Application mit kerberos_5 1.5.3 Yes
Application mit kerberos_5 1.6 Yes
Application mit kerberos_5 1.6.1 Yes
Application mit kerberos_5 1.6.2 Yes

References