CVE-2007-5894
https://notcve.org/view.php?id=CVE-2007-5894
The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initialize the length variable when auth_type has a certain value, which has unknown impact and remote authenticated attack vectors. NOTE: the original disclosure misidentifies the conditions under which the uninitialized variable is used. NOTE: the vendor disputes this issue, stating " The 'length' variable is only uninitialized if 'auth_type' is neither the 'KERBEROS_V4' nor 'GSSAPI'; this condition cannot occur in the unmodified source code. ** EN DISPUTA ** La función de respuesta en ftpd.c en gssftp ftpd en MIT Kerberos 5 (krb5) no inicializa la variable de longitud cuando auth_type tiene un cierto valor, que tiene un impacto desconocido y vectores de ataque autenticados remotos. NOTA: la divulgación original identifica erróneamente las condiciones bajo las cuales se utiliza la variable no inicializada. NOTA: el proveedor discute este problema, indicando que "la variable 'longitud' solo no se inicializa si 'auth_type' no es ni 'KERBEROS_V4' ni 'GSSAPI'; esta condición no puede ocurrir en el código fuente no modificado". • http://bugs.gentoo.org/show_bug.cgi?id=199205 http://osvdb.org/44333 http://seclists.org/fulldisclosure/2007/Dec/0176.html http://seclists.org/fulldisclosure/2007/Dec/0321.html http://secunia.com/advisories/28636 http://secunia.com/advisories/29457 http://wiki.rpath.com/Advisories:rPSA-2008-0112 http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112 http://www.novell.com/linux/security/advisories/suse_security_summary_report.html http://www.securityfocus.com/archive/1/489883 •
CVE-2007-5971 – krb5: double free in gssapi lib
https://notcve.org/view.php?id=CVE-2007-5971
Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. Una vulnerabilidad de doble liberación en la función gss_krb5int_make_seal_token_v3 en la biblioteca lib/gssapi/krb5/k5sealv3.c en MIT Kerberos 5 (krb5), presenta un impacto desconocido y vectores de ataques. • http://bugs.gentoo.org/show_bug.cgi?id=199212 http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://osvdb.org/43345 http://seclists.org/fulldisclosure/2007/Dec/0176.html http://seclists.org/fulldisclosure/2007/Dec/0321.html http://secunia.com/advisories/28636 http://secunia.com/advisories/29420 http://secunia.com/advisories/29450 http://secunia.com/advisories/29451 http://secunia.com/advisories • CWE-399: Resource Management Errors •
CVE-2007-5901 – krb5: use-after-free in gssapi lib
https://notcve.org/view.php?id=CVE-2007-5901
Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_initialize.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. NOTE: this might be the result of a typo in the source code. Vulnerabilidad de uso después de liberación (use-after-free) en la función gss_indicate_mechs de lib/gssapi/mechglue/g_initialize.c en MIT Kerberos 5 (krb5) tiene impacto y vectores de ataque desconocidos. NOTA: esto podría ser resultado de una errata en el código fuente. • http://bugs.gentoo.org/show_bug.cgi?id=199214 http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://osvdb.org/43346 http://seclists.org/fulldisclosure/2007/Dec/0176.html http://seclists.org/fulldisclosure/2007/Dec/0321.html http://secunia.com/advisories/29451 http://secunia.com/advisories/29464 http://secunia.com/advisories/29516 http://secunia.com/advisories/39290 http://security.gentoo.org • CWE-399: Resource Management Errors CWE-416: Use After Free •
CVE-2007-5902
https://notcve.org/view.php?id=CVE-2007-5902
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request. Desbordamiento de entero en la función svcauth_gss_get_principal de lib/rpc/svc_auth_gss.c en MIT Kerberos 5 (krb5) permite a atacantes remotos tener impacto desconocido mediante un valor de longitud grande para un nombre de cliente GSS en una petición RPC. • http://bugs.gentoo.org/show_bug.cgi?id=199214 http://osvdb.org/44748 http://seclists.org/fulldisclosure/2007/Dec/0176.html http://seclists.org/fulldisclosure/2007/Dec/0321.html http://secunia.com/advisories/28636 http://secunia.com/advisories/29457 http://secunia.com/advisories/39290 http://secunia.com/advisories/39784 http://ubuntu.com/usn/usn-924-1 http://wiki.rpath.com/Advisories:rPSA-2008-0112 http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112 http:// • CWE-189: Numeric Errors •
CVE-2007-5972
https://notcve.org/view.php?id=CVE-2007-5972
Double free vulnerability in the krb5_def_store_mkey function in lib/kdb/kdb_default.c in MIT Kerberos 5 (krb5) 1.5 has unknown impact and remote authenticated attack vectors. NOTE: the free operations occur in code that stores the krb5kdc master key, and so the attacker must have privileges to store this key. Una vulnerabilidad de doble liberación en la función krb5_def_store_mkey en la biblioteca lib/kdb/kdb_default.c en MIT Kerberos 5 (krb5) versión 1.5 presenta un impacto desconocido y vectores de ataque autenticados remotos. NOTA: las operaciones de liberación se producen en el código que almacena la clave maestra krb5kdc, por lo que el atacante requiere privilegios para almacenar esta clave. • http://bugs.gentoo.org/show_bug.cgi?id=199211 http://osvdb.org/44747 http://seclists.org/fulldisclosure/2007/Dec/0176.html http://seclists.org/fulldisclosure/2007/Dec/0321.html http://secunia.com/advisories/28636 http://secunia.com/advisories/39290 http://secunia.com/advisories/39784 http://ubuntu.com/usn/usn-924-1 http://www.novell.com/linux/security/advisories/suse_security_summary_report.html http://www.securityfocus.com/bid/26750 http://www.ubuntu.com/usn/USN& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •