National Vulnerability Database

National Vulnerability Database

National Vulnerability

CVE-2007-2442 Detail


The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.

Source:  MITRE      Last Modified:  06/26/2007

Quick Info

CVE Dictionary Entry:
Original release date:
Last revised:


CVSS Severity (version 2.0):
CVSS v2 Base Score:
9.3 HIGH
(AV:N/AC:M/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
Exploitability Subscore:
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to

Hyperlink Resource Type Source Name External Source SGI 20070602-01-P External Source CONFIRM External Source HP HPSBUX02544 External Source APPLE APPLE-SA-2007-07-31 External Source FULLDISC 20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player External Source GENTOO GLSA-200707-11 External Source SUNALERT 102914 External Source CONFIRM Patch; Vendor Advisory External Source CONFIRM External Source DEBIAN DSA-1323 Patch; US Government Resource External Source CERT-VN VU#356961 External Source MANDRIVA MDKSA-2007:137 External Source SUSE SUSE-SA:2007:038 External Source REDHAT RHSA-2007:0384 External Source REDHAT RHSA-2007:0562 External Source BUGTRAQ 20070626 MITKRB5-SA-2007-004: kadmind multiple RPC lib vulnerabilities External Source BUGTRAQ 20070628 FLEA-2007-0029-1: krb5 krb5-workstation External Source BUGTRAQ 20070629 TSLSA-2007-0021 - kerberos5 External Source BID 24655 External Source BID 25159 External Source SECTRACK 1018293 External Source TRUSTIX 2007-0021 External Source UBUNTU USN-477-1 Patch; US Government Resource External Source CERT TA07-177A External Source VUPEN ADV-2007-2337 External Source VUPEN ADV-2007-2354 External Source VUPEN ADV-2007-2491 External Source VUPEN ADV-2007-2732 External Source VUPEN ADV-2007-3229 External Source VUPEN ADV-2010-1574 External Source XF kerberos-gssrpcsvcauthgssapi-code-execution(35082) External Source CONFIRM External Source OVAL oval:org.mitre.oval:def:10631 External Source OVAL oval:org.mitre.oval:def:7344 External Source CONFIRM

References to Check Content

Check System:
Check System:

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
cpe:2.3:a:mit:kerberos:*:*:*:*:*:*:*:*    versions up to (including) 5-1.6.1

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 4 change records found - show changes