// For flags

CVE-2008-0947

krb5: file descriptor array overflow in RPC library

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.

Desbordamiento de búfer en la librería RPC utilizada por libgssrpc y kadmind en MIT Kerberos 5 (krb5) de 1.4 a 1.6.3 permite a atacantes remotos ejecutar código de su elección disparando una gran cantidad de descriptores de archivo abierto.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-02-25 CVE Reserved
  • 2008-03-19 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (39)
URL Tag Source
http://secunia.com/advisories/29424 Third Party Advisory
http://secunia.com/advisories/29428 Third Party Advisory
http://secunia.com/advisories/29435 Third Party Advisory
http://secunia.com/advisories/29438 Third Party Advisory
http://secunia.com/advisories/29451 Third Party Advisory
http://secunia.com/advisories/29457 Third Party Advisory
http://secunia.com/advisories/29462 Third Party Advisory
http://secunia.com/advisories/29464 Third Party Advisory
http://secunia.com/advisories/29516 Third Party Advisory
http://secunia.com/advisories/29663 Third Party Advisory
http://securityreason.com/securityalert/3752 Third Party Advisory
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html X_refsource_confirm
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html X_refsource_confirm
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-002.txt X_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0112 X_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112 X_refsource_confirm
http://www.kb.cert.org/vuls/id/374121 Third Party Advisory
http://www.securityfocus.com/archive/1/489762/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/489784/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/489883/100/0/threaded Mailing List
http://www.securityfocus.com/bid/28302 Vdb Entry
http://www.securitytracker.com/id?1019631 Vdb Entry
http://www.us-cert.gov/cas/techalerts/TA08-079B.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/0922/references Vdb Entry
http://www.vupen.com/english/advisories/2008/1102/references Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/41273 Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10984 Signature
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.4
Search vendor "Mit" for product "Kerberos 5" and version "1.4"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.4.1
Search vendor "Mit" for product "Kerberos 5" and version "1.4.1"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.4.2
Search vendor "Mit" for product "Kerberos 5" and version "1.4.2"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.4.3
Search vendor "Mit" for product "Kerberos 5" and version "1.4.3"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.4.4
Search vendor "Mit" for product "Kerberos 5" and version "1.4.4"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.5
Search vendor "Mit" for product "Kerberos 5" and version "1.5"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.5.1
Search vendor "Mit" for product "Kerberos 5" and version "1.5.1"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.5.2
Search vendor "Mit" for product "Kerberos 5" and version "1.5.2"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.5.3
Search vendor "Mit" for product "Kerberos 5" and version "1.5.3"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.6
Search vendor "Mit" for product "Kerberos 5" and version "1.6"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.6.1
Search vendor "Mit" for product "Kerberos 5" and version "1.6.1"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.6.2
Search vendor "Mit" for product "Kerberos 5" and version "1.6.2"
-
Affected
Mit
Search vendor "Mit"
Kerberos 5
Search vendor "Mit" for product "Kerberos 5"
1.6.3
Search vendor "Mit" for product "Kerberos 5" and version "1.6.3"
-
Affected