Lucene search

K
gentooGentoo FoundationGLSA-200707-11
HistoryJul 25, 2007 - 12:00 a.m.

MIT Kerberos 5: Arbitrary remote code execution

2007-07-2500:00:00
Gentoo Foundation
security.gentoo.org
26

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.966

Percentile

99.6%

Background

MIT Kerberos 5 is a suite of applications that implement the Kerberos network protocol.

Description

kadmind is affected by multiple vulnerabilities in the RPC library shipped with MIT Kerberos 5. It fails to properly handle zero-length RPC credentials (CVE-2007-2442) and the RPC library can write past the end of the stack buffer (CVE-2007-2443). Furthermore kadmind fails to do proper bounds checking (CVE-2007-2798).

Impact

A remote unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code with root privileges.

Workaround

There is no known workaround at this time.

Resolution

All MIT Kerberos 5 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-crypt/mit-krb5< 1.5.2-r3UNKNOWN

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.966

Percentile

99.6%