← Back to CVEs
CVE-2007-3999
N/ADescription
Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
CVE Details
CVSS v3.1 ScoreN/A
Published9/5/2007
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
mit:kerberos_5
Weaknesses (CWE)
CWE-119
References
http://docs.info.apple.com/article.html?artnum=307041(cve@mitre.org)
http://secunia.com/advisories/26676(cve@mitre.org)
http://secunia.com/advisories/26680(cve@mitre.org)
http://secunia.com/advisories/26684(cve@mitre.org)
http://secunia.com/advisories/26691(cve@mitre.org)
http://secunia.com/advisories/26697(cve@mitre.org)
http://secunia.com/advisories/26699(cve@mitre.org)
http://secunia.com/advisories/26700(cve@mitre.org)
http://secunia.com/advisories/26705(cve@mitre.org)
http://secunia.com/advisories/26713(cve@mitre.org)
http://secunia.com/advisories/26728(cve@mitre.org)
http://secunia.com/advisories/26783(cve@mitre.org)
http://secunia.com/advisories/26792(cve@mitre.org)
http://secunia.com/advisories/26822(cve@mitre.org)
http://secunia.com/advisories/26896(cve@mitre.org)
http://secunia.com/advisories/26987(cve@mitre.org)
http://secunia.com/advisories/27043(cve@mitre.org)
http://secunia.com/advisories/27081(cve@mitre.org)
http://secunia.com/advisories/27146(cve@mitre.org)
http://secunia.com/advisories/27643(cve@mitre.org)
http://secunia.com/advisories/27756(cve@mitre.org)
http://secunia.com/advisories/29247(cve@mitre.org)
http://secunia.com/advisories/29270(cve@mitre.org)
http://security.gentoo.org/glsa/glsa-200710-01.xml(cve@mitre.org)
http://securityreason.com/securityalert/3092(cve@mitre.org)
http://support.avaya.com/elmodocs2/security/ASA-2007-396.htm(cve@mitre.org)
http://www.debian.org/security/2007/dsa-1367(cve@mitre.org)
http://www.debian.org/security/2007/dsa-1368(cve@mitre.org)
http://www.gentoo.org/security/en/glsa/glsa-200709-01.xml(cve@mitre.org)
http://www.kb.cert.org/vuls/id/883632(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2007-0858.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2007-0913.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2007-0951.html(cve@mitre.org)
http://www.securityfocus.com/archive/1/478748/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/479251/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/25534(cve@mitre.org)
http://www.securityfocus.com/bid/26444(cve@mitre.org)
http://www.securitytracker.com/id?1018647(cve@mitre.org)
http://www.trustix.org/errata/2007/0026/(cve@mitre.org)
http://www.ubuntu.com/usn/usn-511-1(cve@mitre.org)
http://www.us-cert.gov/cas/techalerts/TA07-319A.html(cve@mitre.org)
http://www.vupen.com/english/advisories/2007/3051(cve@mitre.org)
http://www.vupen.com/english/advisories/2007/3052(cve@mitre.org)
http://www.vupen.com/english/advisories/2007/3060(cve@mitre.org)
http://www.vupen.com/english/advisories/2007/3868(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/0803/references(cve@mitre.org)
http://www.zerodayinitiative.com/advisories/ZDI-07-052.html(cve@mitre.org)
https://bugzilla.redhat.com/show_bug.cgi?id=250973(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36437(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3162(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9379(cve@mitre.org)
http://docs.info.apple.com/article.html?artnum=307041(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.rpath.com/pipermail/security-announce/2007-September/000237.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26676(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26680(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26684(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26691(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26697(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26699(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26700(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26705(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26713(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26728(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26783(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26792(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26822(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26896(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26987(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27043(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27081(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27146(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27643(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27756(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29247(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29270(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200710-01.xml(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/3092(af854a3a-2127-422b-91ae-364da2661108)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103060-1(af854a3a-2127-422b-91ae-364da2661108)
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201319-1(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2007-396.htm(af854a3a-2127-422b-91ae-364da2661108)
http://web.mit.edu/Kerberos/advisories/MITKRB5-SA-2007-006.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2007/dsa-1367(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2007/dsa-1368(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200709-01.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/883632(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:174(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:181(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2007_19_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2007_24_sr.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-0858.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-0913.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-0951.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/478748/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/479251/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/25534(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/26444(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1018647(af854a3a-2127-422b-91ae-364da2661108)
http://www.trustix.org/errata/2007/0026/(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-511-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA07-319A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/3051(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/3052(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/3060(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/3868(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/0803/references(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-07-052.html(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=250973(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36437(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3162(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9379(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00087.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00173.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.