Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2007-3999

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.299
EPSS Ranking 96.4%
CVSS Severity
CVSS v2 Score 10.0
References
Products affected by CVE-2007-3999
  • Mit » Kerberos 5 » Version: 1.4
    cpe:2.3:a:mit:kerberos_5:1.4
  • Mit » Kerberos 5 » Version: 1.4.1
    cpe:2.3:a:mit:kerberos_5:1.4.1
  • Mit » Kerberos 5 » Version: 1.4.2
    cpe:2.3:a:mit:kerberos_5:1.4.2
  • Mit » Kerberos 5 » Version: 1.4.3
    cpe:2.3:a:mit:kerberos_5:1.4.3
  • Mit » Kerberos 5 » Version: 1.4.4
    cpe:2.3:a:mit:kerberos_5:1.4.4
  • Mit » Kerberos 5 » Version: 1.5
    cpe:2.3:a:mit:kerberos_5:1.5
  • Mit » Kerberos 5 » Version: 1.5.1
    cpe:2.3:a:mit:kerberos_5:1.5.1
  • Mit » Kerberos 5 » Version: 1.5.2
    cpe:2.3:a:mit:kerberos_5:1.5.2
  • Mit » Kerberos 5 » Version: 1.5.3
    cpe:2.3:a:mit:kerberos_5:1.5.3
  • Mit » Kerberos 5 » Version: 1.6
    cpe:2.3:a:mit:kerberos_5:1.6
  • Mit » Kerberos 5 » Version: 1.6.1
    cpe:2.3:a:mit:kerberos_5:1.6.1
  • Mit » Kerberos 5 » Version: 1.6.2
    cpe:2.3:a:mit:kerberos_5:1.6.2


Contact Us

Shodan ® - All rights reserved