CVE ID | CVE-2007-3999 |
CVSS SCORE | |
AFFECTED VENDORS |
MIT |
AFFECTED PRODUCTS |
Kerberos |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['5503']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of MIT Kerberos. Authentication is not required to exploit this vulnerability. The specific flaw exists in the svcauth_gss_validate() function. By sending a large authentication context over RPC, a stack based buffer overflow occurs, resulting in a situation allowing for remote code execution. The vulnerable line of the function is: memcpy((caddr_t)buf, oa->oa_base, oa->oa_length); If 128 < oa->oa_length < 400, the exploitable situation occurs. Over 400 bytes is caught during a separate check for MAX_AUTH_SIZE earlier in the RPC packet decoding process. |
ADDITIONAL DETAILS |
MIT has issued an update to correct this vulnerability. More details can be found at:
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-006.txt |
DISCLOSURE TIMELINE |
|
CREDIT | Tenable Network Security |