CVE-2007-3999

Publication date 5 September 2007

Last updated 24 July 2024


Ubuntu priority

Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.

Status

Package Ubuntu Release Status
krb5 7.04 feisty
Fixed 1.4.4-5ubuntu3.3
6.10 edgy
Fixed 1.4.3-9ubuntu1.5
6.06 LTS dapper
Fixed 1.4.3-5ubuntu0.6
librpcsecgss 7.04 feisty
Fixed 0.14-2ubuntu1.2
6.10 edgy
Fixed 0.13-2ubuntu0.2
6.06 LTS dapper
Fixed 0.7-0ubuntu1.2

References

Related Ubuntu Security Notices (USN)

    • USN-511-1
    • Kerberos vulnerability
    • 4 September 2007

Other references