New Search

Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC) in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments possibly involving certain format string specifiers.

oval:org.mitre.oval:def:10757

Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC) in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments possibly involving certain format string specifiers.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • Oracle Linux 4
  • Red Hat Enterprise Linux 4
  • CentOS Linux 4
  • CentOS Linux 5
  • Red Hat Enterprise Linux 3
  • Oracle Linux 5
  • Red Hat Enterprise Linux 5
  • CentOS Linux 3
Class:
vulnerability
Reference(s):
  • CVE-2007-0957
Product(s):