Site Network: | | Jongsma & Jongsma

Security for All

Sûnnet Beskerming is a company with a focus and a drive to provide Information Security services for all those who want to stay safe and secure in an online world.

Username: | Password: Contact us to request an account

Kerberos - Remote hacker automatic

Version: At least version 5-1.6.1
Technical Details:

RPC credentials of zero length can crash Kerberos and may lead to arbitrary code execution. Specifically, the gssrpc__svcauth_gssapi() function is vulnerable.

An integer conversion error in gssrpc__svcauth_unix() can lead to a crash of Kerberos or arbitrary code execution.

Finally, a stack overflow in rename_principal_2_svc() can lead to a crash of Kerberos or arbitrary code execution.


Numerous vulnerabilities have been disclosed affecting the Kerberos authentication protocol, as maintained by MIT. Most of the disclosed issues can lead to remote attackers taking control over vulnerable systems.

Exploit samples for some of the issues are already privately held by MIT.


Administrators and advanced users should apply the updates to Kerberos as soon as practical.




Privately held by MIT

External Tracking Data:

CVE-ID: CVE-2007-2798 CVE-ID: CVE-2007-2442 CVE-ID: CVE-2007-2443

Social bookmark this page