CVE-2007-5901
krb5: use-after-free in gssapi lib
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_initialize.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. NOTE: this might be the result of a typo in the source code.
Vulnerabilidad de uso después de liberación (use-after-free) en la función gss_indicate_mechs de lib/gssapi/mechglue/g_initialize.c en MIT Kerberos 5 (krb5) tiene impacto y vectores de ataque desconocidos. NOTA: esto podría ser resultado de una errata en el código fuente.
Sol Jerome discovered that the Kerberos kadmind service did not correctly free memory. An unauthenticated remote attacker could send specially crafted traffic to crash the kadmind process, leading to a denial of service. It was discovered that Kerberos did not correctly free memory in the GSSAPI library. If a remote attacker were able to manipulate an application using GSSAPI carefully, the service could crash, leading to a denial of service. It was discovered that Kerberos did not correctly free memory in the GSSAPI and kdb libraries. If a remote attacker were able to manipulate an application using these libraries carefully, the service could crash, leading to a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-11-09 CVE Reserved
- 2007-12-06 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-399: Resource Management Errors
- CWE-416: Use After Free
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://docs.info.apple.com/article.html?artnum=307562 | X_refsource_confirm | |
http://osvdb.org/43346 | Vdb Entry | |
http://seclists.org/fulldisclosure/2007/Dec/0176.html | Mailing List |
|
http://seclists.org/fulldisclosure/2007/Dec/0321.html | Mailing List |
|
http://secunia.com/advisories/29451 | Third Party Advisory | |
http://secunia.com/advisories/29464 | Third Party Advisory | |
http://secunia.com/advisories/29516 | Third Party Advisory | |
http://secunia.com/advisories/39290 | Third Party Advisory | |
http://www.vupen.com/english/advisories/2008/0924/references | Vdb Entry | |
https://issues.rpath.com/browse/RPL-2012 | X_refsource_confirm | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11451 | Signature |
URL | Date | SRC |
---|---|---|
http://bugs.gentoo.org/show_bug.cgi?id=199214 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/26750 | 2017-09-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | <= 1.6.3_kdc Search vendor "Mit" for product "Kerberos 5" and version " <= 1.6.3_kdc" | - |
Affected
| in | Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.4.11 Search vendor "Apple" for product "Mac Os X" and version "10.4.11" | - |
Safe
|
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | <= 1.6.3_kdc Search vendor "Mit" for product "Kerberos 5" and version " <= 1.6.3_kdc" | - |
Affected
| in | Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.5.2 Search vendor "Apple" for product "Mac Os X" and version "10.5.2" | - |
Safe
|
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | <= 1.6.3_kdc Search vendor "Mit" for product "Kerberos 5" and version " <= 1.6.3_kdc" | - |
Affected
| in | Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.4.11 Search vendor "Apple" for product "Mac Os X Server" and version "10.4.11" | - |
Safe
|
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | <= 1.6.3_kdc Search vendor "Mit" for product "Kerberos 5" and version " <= 1.6.3_kdc" | - |
Affected
| in | Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | 10.5.2 Search vendor "Apple" for product "Mac Os X Server" and version "10.5.2" | - |
Safe
|