CVE-2007-0957

Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc Broken Link
http://docs.info.apple.com/article.html?artnum=305391 Broken Link
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html Mailing List Third Party Advisory
http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html Broken Link
http://secunia.com/advisories/24706 Third Party Advisory
http://secunia.com/advisories/24735 Third Party Advisory
http://secunia.com/advisories/24736 Third Party Advisory
http://secunia.com/advisories/24740 Third Party Advisory
http://secunia.com/advisories/24750 Third Party Advisory
http://secunia.com/advisories/24757 Third Party Advisory
http://secunia.com/advisories/24785 Third Party Advisory
http://secunia.com/advisories/24786 Third Party Advisory
http://secunia.com/advisories/24798 Third Party Advisory
http://secunia.com/advisories/24817 Third Party Advisory
http://secunia.com/advisories/24966 Third Party Advisory
http://secunia.com/advisories/25464 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200704-02.xml Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1 Broken Link
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt Patch Vendor Advisory
http://www.debian.org/security/2007/dsa-1276 Third Party Advisory
http://www.kb.cert.org/vuls/id/704024 Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:077 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0095.html Third Party Advisory
http://www.securityfocus.com/archive/1/464592/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/464666/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/464814/30/7170/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/23285 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1017849 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-449-1 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA07-093B.html Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-109A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/1218 Third Party Advisory
http://www.vupen.com/english/advisories/2007/1250 Third Party Advisory
http://www.vupen.com/english/advisories/2007/1470 Third Party Advisory
http://www.vupen.com/english/advisories/2007/1983 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/33411 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757 Broken Link Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*

History

02 Feb 2021, 18:24

Type Values Removed Values Added
CPE cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
CWE NVD-CWE-Other CWE-787
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/33411 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/33411 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/24817 - (SECUNIA) http://secunia.com/advisories/24817 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/usn-449-1 - Patch, Vendor Advisory (UBUNTU) http://www.ubuntu.com/usn/usn-449-1 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/24757 - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/24757 - Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:077 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:077 - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2007/1250 - (VUPEN) http://www.vupen.com/english/advisories/2007/1250 - Third Party Advisory
References (SUSE) http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html - (SUSE) http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html - Broken Link
References (CERT) http://www.us-cert.gov/cas/techalerts/TA07-109A.html - US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA07-109A.html - Third Party Advisory, US Government Resource
References (APPLE) http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - (APPLE) http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/24736 - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/24736 - Third Party Advisory
References (CERT) http://www.us-cert.gov/cas/techalerts/TA07-093B.html - US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA07-093B.html - Third Party Advisory, US Government Resource
References (SECUNIA) http://secunia.com/advisories/24785 - (SECUNIA) http://secunia.com/advisories/24785 - Third Party Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/464666/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/464666/100/0/threaded - Third Party Advisory, VDB Entry
References (DEBIAN) http://www.debian.org/security/2007/dsa-1276 - Patch, Vendor Advisory (DEBIAN) http://www.debian.org/security/2007/dsa-1276 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/23285 - (BID) http://www.securityfocus.com/bid/23285 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/24798 - (SECUNIA) http://secunia.com/advisories/24798 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/24966 - (SECUNIA) http://secunia.com/advisories/24966 - Third Party Advisory
References (GENTOO) http://security.gentoo.org/glsa/glsa-200704-02.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200704-02.xml - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/24786 - (SECUNIA) http://secunia.com/advisories/24786 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/24735 - (SECUNIA) http://secunia.com/advisories/24735 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/24706 - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/24706 - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757 - Broken Link, Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0095.html - Patch, Vendor Advisory (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0095.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/25464 - (SECUNIA) http://secunia.com/advisories/25464 - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2007/1470 - (VUPEN) http://www.vupen.com/english/advisories/2007/1470 - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2007/1983 - (VUPEN) http://www.vupen.com/english/advisories/2007/1983 - Third Party Advisory
References (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1 - (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1 - Broken Link
References (BUGTRAQ) http://www.securityfocus.com/archive/1/464814/30/7170/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/464814/30/7170/threaded - Third Party Advisory, VDB Entry
References (CERT-VN) http://www.kb.cert.org/vuls/id/704024 - Patch, Third Party Advisory, US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/704024 - Third Party Advisory, US Government Resource
References (SECUNIA) http://secunia.com/advisories/24750 - (SECUNIA) http://secunia.com/advisories/24750 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/24740 - (SECUNIA) http://secunia.com/advisories/24740 - Third Party Advisory
References (BUGTRAQ) http://www.securityfocus.com/archive/1/464592/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/464592/100/0/threaded - Third Party Advisory, VDB Entry
References (SGI) ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc - (SGI) ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc - Broken Link
References (SECTRACK) http://www.securitytracker.com/id?1017849 - (SECTRACK) http://www.securitytracker.com/id?1017849 - Third Party Advisory, VDB Entry
References (CONFIRM) http://docs.info.apple.com/article.html?artnum=305391 - (CONFIRM) http://docs.info.apple.com/article.html?artnum=305391 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2007/1218 - (VUPEN) http://www.vupen.com/english/advisories/2007/1218 - Third Party Advisory

Information

Published : 2007-04-06 01:19

Updated : 2023-12-10 10:40


NVD link : CVE-2007-0957

Mitre link : CVE-2007-0957

CVE.ORG link : CVE-2007-0957


JSON object : View

Products Affected

canonical

  • ubuntu_linux

mit

  • kerberos_5

debian

  • debian_linux
CWE
CWE-787

Out-of-bounds Write