Description
Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
Published: 2007-06-26
Score: 9.0 Critical
EPSS: 34.9% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1323-1 New krb5 packages fix several vulnerabilities
Ubuntu USN Ubuntu USN USN-477-1 krb5 vulnerabilities
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc cve-icon cve-icon
http://docs.info.apple.com/article.html?artnum=306172 cve-icon cve-icon
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427 cve-icon cve-icon
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=548 cve-icon cve-icon
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html cve-icon cve-icon
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html cve-icon cve-icon
http://osvdb.org/36595 cve-icon cve-icon
http://secunia.com/advisories/25800 cve-icon cve-icon
http://secunia.com/advisories/25801 cve-icon cve-icon
http://secunia.com/advisories/25814 cve-icon cve-icon
http://secunia.com/advisories/25821 cve-icon cve-icon
http://secunia.com/advisories/25870 cve-icon cve-icon
http://secunia.com/advisories/25875 cve-icon cve-icon
http://secunia.com/advisories/25888 cve-icon cve-icon
http://secunia.com/advisories/25890 cve-icon cve-icon
http://secunia.com/advisories/25894 cve-icon cve-icon
http://secunia.com/advisories/25911 cve-icon cve-icon
http://secunia.com/advisories/26033 cve-icon cve-icon
http://secunia.com/advisories/26228 cve-icon cve-icon
http://secunia.com/advisories/26235 cve-icon cve-icon
http://secunia.com/advisories/26909 cve-icon cve-icon
http://secunia.com/advisories/27706 cve-icon cve-icon
http://secunia.com/advisories/40346 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200707-11.xml cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102985-1 cve-icon cve-icon
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2007-005.txt cve-icon cve-icon
http://www.debian.org/security/2007/dsa-1323 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/554257 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:137 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_38_krb5.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0384.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0562.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/472289/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/472432/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/472507/30/5970/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/24653 cve-icon cve-icon
http://www.securityfocus.com/bid/25159 cve-icon cve-icon
http://www.securitytracker.com/id?1018295 cve-icon cve-icon
http://www.trustix.org/errata/2007/0021/ cve-icon cve-icon
http://www.ubuntu.com/usn/usn-477-1 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA07-177A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/2337 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/2370 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/2491 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/2732 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3229 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1574 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/35080 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1499 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-2798 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1726 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7550 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9996 cve-icon cve-icon
https://secure-support.novell.com/KanisaPlatform/Publishing/327/3675615_f.SAL_Public.html cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-2798 cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Mit Kerberos 5
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T13:49:57.331Z

Reserved: 2007-05-22T00:00:00.000Z

Link: CVE-2007-2798

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2007-06-26T22:30:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2007-2798

cve-icon Redhat

Severity : Important

Publid Date: 2007-06-26T00:00:00Z

Links: CVE-2007-2798 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses