Vulnerabilidad en Vulnerabilidad en la librería RPC de MIT Kerberos 5 (CVE-2007-2442)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-824
Acceso a puntero no inicializado
Fecha de publicación:
26/06/2007
Última modificación:
09/02/2024
Descripción
La función gssrpc__svcauth_gssapi en la librería RPC de MIT Kerberos 5 (krb5) 1.6.1 y anteriores podría permitir a atacantes remotos ejecutar código de su elección mediante credenciales RPC de longitud cero, lo cual provoca que kadmind libere un puntero no inicializado durante la limpieza.
Impacto
Puntuación base 2.0
10.00
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:* | 1.6.1 (incluyendo) | |
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://docs.info.apple.com/article.html?artnum=306172
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427
- http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
- http://osvdb.org/36596
- http://secunia.com/advisories/25800
- http://secunia.com/advisories/25801
- http://secunia.com/advisories/25814
- http://secunia.com/advisories/25821
- http://secunia.com/advisories/25841
- http://secunia.com/advisories/25870
- http://secunia.com/advisories/25888
- http://secunia.com/advisories/25890
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/25911
- http://secunia.com/advisories/26033
- http://secunia.com/advisories/26228
- http://secunia.com/advisories/26235
- http://secunia.com/advisories/26909
- http://secunia.com/advisories/27706
- http://secunia.com/advisories/40346
- http://security.gentoo.org/glsa/glsa-200707-11.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102914-1
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt
- http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt
- http://www.debian.org/security/2007/dsa-1323
- http://www.kb.cert.org/vuls/id/356961
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A137
- http://www.novell.com/linux/security/advisories/2007_38_krb5.html
- http://www.redhat.com/support/errata/RHSA-2007-0384.html
- http://www.redhat.com/support/errata/RHSA-2007-0562.html
- http://www.securityfocus.com/archive/1/472288/100/0/threaded
- http://www.securityfocus.com/archive/1/472432/100/0/threaded
- http://www.securityfocus.com/archive/1/472507/30/5970/threaded
- http://www.securityfocus.com/bid/24655
- http://www.securityfocus.com/bid/25159
- http://www.securitytracker.com/id?1018293=
- http://www.trustix.org/errata/2007/0021/
- http://www.ubuntu.com/usn/usn-477-1
- http://www.us-cert.gov/cas/techalerts/TA07-177A.html
- http://www.vupen.com/english/advisories/2007/2337
- http://www.vupen.com/english/advisories/2007/2354
- http://www.vupen.com/english/advisories/2007/2491
- http://www.vupen.com/english/advisories/2007/2732
- http://www.vupen.com/english/advisories/2007/3229
- http://www.vupen.com/english/advisories/2010/1574
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35082
- https://issues.rpath.com/browse/RPL-1499
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10631
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7344
- https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html