CVE-2007-5902
Published: 5 December 2007
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
Notes
Author | Note |
---|---|
kees | upstream does not feel this is a security issue |
Priority
Status
Package | Release | Status |
---|---|---|
krb5 Launchpad, Ubuntu, Debian |
dapper |
Released
(1.4.3-5ubuntu0.11)
|
edgy |
Ignored
(end of life, was needed)
|
|
feisty |
Ignored
(end of life, was needed)
|
|
gutsy |
Ignored
(end of life, was needed)
|
|
hardy |
Released
(1.6.dfsg.3~beta1-2ubuntu1.4)
|
|
intrepid |
Not vulnerable
|
|
jaunty |
Not vulnerable
|
|
karmic |
Not vulnerable
|
|
lucid |
Not vulnerable
|
|
upstream |
Released
|
|
Patches: upstream: http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/rpc/svc_auth_gss.c?r1=19923&r2=20181 |