Description
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2007-5872 | Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request. |
Ubuntu USN |
USN-924-1 | Kerberos vulnerabilities |
Ubuntu USN |
USN-940-1 | Kerberos vulnerabilities |
References
History
Wed, 28 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T15:47:00.452Z
Reserved: 2007-11-09T00:00:00.000Z
Link: CVE-2007-5902
No data.
Status : Modified
Published: 2007-12-06T02:46:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-5902
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN