CVE-2007-5894

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2007-5894
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2007-5894.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2007-5894
Related
Withdrawn
2018-10-15T20:57:01Z
Published
2007-12-06T02:46:00Z
Modified
2024-08-07T16:15:33Z
Summary
[none]
Details

The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initialize the length variable when authtype has a certain value, which has unknown impact and remote authenticated attack vectors. NOTE: the original disclosure misidentifies the conditions under which the uninitialized variable is used. NOTE: the vendor disputes this issue, stating " The 'length' variable is only uninitialized if 'authtype' is neither the 'KERBEROS_V4' nor 'GSSAPI'; this condition cannot occur in the unmodified source code.

References

Affected packages

Debian:11 / krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.dfsg.4~beta1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.dfsg.4~beta1-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.dfsg.4~beta1-1

Ecosystem specific

{
    "urgency": "unimportant"
}