Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2007-0957

PUBLISHED 07.08.2024

CNA: mitre

Обновлено: 16.10.2018
Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.

БДУ ФСТЭК

Идентификатор Описание
BDU:2015-09557 Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

Доп. Информация

Product Status

n/a
Product: n/a
Vendor: n/a
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версии n/a affected
 

Ссылки

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757
http://www.vupen.com/english/advisories/2007/1218
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt
http://www.securityfocus.com/archive/1/464592/100/0/threaded
ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
http://secunia.com/advisories/24966
http://secunia.com/advisories/24706
http://secunia.com/advisories/24798
http://secunia.com/advisories/24740
http://www.redhat.com/support/errata/RHSA-2007-0095.html
http://www.vupen.com/english/advisories/2007/1983
http://secunia.com/advisories/24786
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1
http://docs.info.apple.com/article.html?artnum=305391
http://www.us-cert.gov/cas/techalerts/TA07-093B.html
http://www.securityfocus.com/archive/1/464814/30/7170/threaded
http://www.debian.org/security/2007/dsa-1276
http://secunia.com/advisories/24735
http://www.securityfocus.com/bid/23285
http://www.us-cert.gov/cas/techalerts/TA07-109A.html
http://secunia.com/advisories/24750
http://www.vupen.com/english/advisories/2007/1250
http://secunia.com/advisories/24817
http://secunia.com/advisories/24757
https://exchange.xforce.ibmcloud.com/vulnerabilities/33411
http://www.kb.cert.org/vuls/id/704024
http://www.securitytracker.com/id?1017849
http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
http://secunia.com/advisories/24785
http://secunia.com/advisories/25464
http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
http://www.ubuntu.com/usn/usn-449-1
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
http://www.vupen.com/english/advisories/2007/1470
http://secunia.com/advisories/24736
http://www.securityfocus.com/archive/1/464666/100/0/threaded
http://security.gentoo.org/glsa/glsa-200704-02.xml

CVE Program Container

Обновлено: 07.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10757
http://www.vupen.com/english/advisories/2007/1218
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2007-002-syslog.txt
http://www.securityfocus.com/archive/1/464592/100/0/threaded
ftp://patches.sgi.com/support/free/security/advisories/20070401-01-P.asc
http://secunia.com/advisories/24966
http://secunia.com/advisories/24706
http://secunia.com/advisories/24798
http://secunia.com/advisories/24740
http://www.redhat.com/support/errata/RHSA-2007-0095.html
http://www.vupen.com/english/advisories/2007/1983
http://secunia.com/advisories/24786
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102930-1
http://docs.info.apple.com/article.html?artnum=305391
http://www.us-cert.gov/cas/techalerts/TA07-093B.html
http://www.securityfocus.com/archive/1/464814/30/7170/threaded
http://www.debian.org/security/2007/dsa-1276
http://secunia.com/advisories/24735
http://www.securityfocus.com/bid/23285
http://www.us-cert.gov/cas/techalerts/TA07-109A.html
http://secunia.com/advisories/24750
http://www.vupen.com/english/advisories/2007/1250
http://secunia.com/advisories/24817
http://secunia.com/advisories/24757
https://exchange.xforce.ibmcloud.com/vulnerabilities/33411
http://www.kb.cert.org/vuls/id/704024
http://www.securitytracker.com/id?1017849
http://lists.suse.com/archive/suse-security-announce/2007-Apr/0001.html
http://secunia.com/advisories/24785
http://secunia.com/advisories/25464
http://www.mandriva.com/security/advisories?name=MDKSA-2007:077
http://www.ubuntu.com/usn/usn-449-1
http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html
http://www.vupen.com/english/advisories/2007/1470
http://secunia.com/advisories/24736
http://www.securityfocus.com/archive/1/464666/100/0/threaded
http://security.gentoo.org/glsa/glsa-200704-02.xml

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.