CVE-2007-4743
CVSS V2 High 10
CVSS V3 None
Description
The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.
Overview
- CVE ID
- CVE-2007-4743
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Modified
- Published Version
- 2007-09-06T22:17:00
- Last Modified Date
- 2020-01-21T15:45:47
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 10
- Severity
- HIGH
- Exploitability Score
- 10
- Impact Score
- 10
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2007-4743 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 16:53:10 | Added to TrackCVE |