2017-10-16 12:31:07 -04:00
{
2019-03-18 00:35:17 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2007-2442" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-18 00:35:17 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player" ,
"refsource" : "FULLDISC" ,
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
} ,
{
"name" : "kerberos-gssrpcsvcauthgssapi-code-execution(35082)" ,
"refsource" : "XF" ,
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/35082"
} ,
{
"name" : "ADV-2007-2732" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2007/2732"
} ,
{
"name" : "25894" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25894"
} ,
{
"name" : "oval:org.mitre.oval:def:10631" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10631"
} ,
{
"name" : "25801" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25801"
} ,
{
"name" : "USN-477-1" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/usn-477-1"
} ,
{
"name" : "VU#356961" ,
"refsource" : "CERT-VN" ,
"url" : "http://www.kb.cert.org/vuls/id/356961"
} ,
{
"name" : "ADV-2007-3229" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2007/3229"
} ,
{
"name" : "20070629 TSLSA-2007-0021 - kerberos5" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://www.securityfocus.com/archive/1/472507/30/5970/threaded"
} ,
{
"name" : "25911" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25911"
} ,
{
"name" : "25888" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25888"
} ,
{
"name" : "36596" ,
"refsource" : "OSVDB" ,
"url" : "http://osvdb.org/36596"
} ,
{
"name" : "RHSA-2007:0384" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0384.html"
} ,
{
"name" : "https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html" ,
"refsource" : "CONFIRM" ,
"url" : "https://secure-support.novell.com/KanisaPlatform/Publishing/773/3248163_f.SAL_Public.html"
} ,
{
"name" : "25890" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25890"
} ,
{
"name" : "ADV-2007-2337" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2007/2337"
} ,
{
"name" : "APPLE-SA-2007-07-31" ,
"refsource" : "APPLE" ,
"url" : "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
} ,
{
"name" : "ADV-2007-2491" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2007/2491"
} ,
{
"name" : "26228" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/26228"
} ,
{
"name" : "ADV-2010-1574" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2010/1574"
} ,
{
"name" : "oval:org.mitre.oval:def:7344" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7344"
} ,
{
"name" : "26033" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/26033"
} ,
{
"name" : "GLSA-200707-11" ,
"refsource" : "GENTOO" ,
"url" : "http://security.gentoo.org/glsa/glsa-200707-11.xml"
} ,
{
"name" : "25800" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25800"
} ,
{
"name" : "SSRT100107" ,
"refsource" : "HP" ,
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427"
} ,
{
"name" : "1018293" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id?1018293"
} ,
{
"name" : "DSA-1323" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2007/dsa-1323"
} ,
{
"name" : "2007-0021" ,
"refsource" : "TRUSTIX" ,
"url" : "http://www.trustix.org/errata/2007/0021/"
} ,
{
"name" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt" ,
"refsource" : "CONFIRM" ,
"url" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-004.txt"
} ,
{
"name" : "TA07-177A" ,
"refsource" : "CERT" ,
"url" : "http://www.us-cert.gov/cas/techalerts/TA07-177A.html"
} ,
{
"name" : "SUSE-SA:2007:038" ,
"refsource" : "SUSE" ,
"url" : "http://www.novell.com/linux/security/advisories/2007_38_krb5.html"
} ,
{
"name" : "25870" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25870"
} ,
{
"name" : "MDKSA-2007:137" ,
"refsource" : "MANDRIVA" ,
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:137"
} ,
{
"name" : "26909" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/26909"
} ,
{
"name" : "https://issues.rpath.com/browse/RPL-1499" ,
"refsource" : "CONFIRM" ,
"url" : "https://issues.rpath.com/browse/RPL-1499"
} ,
{
"name" : "27706" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/27706"
} ,
{
"name" : "http://docs.info.apple.com/article.html?artnum=306172" ,
"refsource" : "CONFIRM" ,
"url" : "http://docs.info.apple.com/article.html?artnum=306172"
} ,
{
"name" : "ADV-2007-2354" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2007/2354"
} ,
{
"name" : "RHSA-2007:0562" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2007-0562.html"
} ,
{
"name" : "HPSBUX02544" ,
"refsource" : "HP" ,
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427"
} ,
{
"name" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt" ,
"refsource" : "CONFIRM" ,
"url" : "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-004.txt"
} ,
{
"name" : "102914" ,
"refsource" : "SUNALERT" ,
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102914-1"
} ,
{
"name" : "20070628 FLEA-2007-0029-1: krb5 krb5-workstation" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://www.securityfocus.com/archive/1/472432/100/0/threaded"
} ,
{
"name" : "25159" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/25159"
} ,
{
"name" : "20070626 MITKRB5-SA-2007-004: kadmind multiple RPC lib vulnerabilities" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://www.securityfocus.com/archive/1/472288/100/0/threaded"
} ,
{
"name" : "25814" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25814"
} ,
{
"name" : "25821" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25821"
} ,
{
"name" : "20070602-01-P" ,
"refsource" : "SGI" ,
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
} ,
{
"name" : "40346" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/40346"
} ,
{
"name" : "25841" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/25841"
} ,
{
"name" : "26235" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/26235"
} ,
{
"name" : "24655" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/24655"
}
]
}
}