1+ [schema ]
2+ version = " 0.1.0"
3+
4+ [snapshot ]
5+ captured = 2025-11-13T16:23:40.512771Z
6+ [[snapshot .cve5 ]]
7+ id = " CVE-2007-5902"
8+ published = 2007-12-06T02:00:00
9+ reserved = 2007-11-09T00:00:00
10+ updated = 2024-08-07T15:47:00.452000Z
11+
12+ [snapshot .cve5 .digest ]
13+ xxh128 = " 7da07ebe6b92f1b30587cb359bc0561d"
14+
15+ [snapshot .cve5 .overview ]
16+ urls = [" https://nvd.nist.gov/vuln/detail/CVE-2007-5902" ]
17+ cna = " mitre"
18+ description = """ Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request."""
19+ references = [
20+ " http://bugs.gentoo.org/show_bug.cgi?id=199214" ,
21+ " http://osvdb.org/44748" ,
22+ " http://seclists.org/fulldisclosure/2007/Dec/0176.html" ,
23+ " http://seclists.org/fulldisclosure/2007/Dec/0321.html" ,
24+ " http://secunia.com/advisories/28636" ,
25+ " http://secunia.com/advisories/29457" ,
26+ " http://secunia.com/advisories/39290" ,
27+ " http://secunia.com/advisories/39784" ,
28+ " http://ubuntu.com/usn/usn-924-1" ,
29+ " http://wiki.rpath.com/Advisories:rPSA-2008-0112" ,
30+ " http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112" ,
31+ " http://www.novell.com/linux/security/advisories/suse_security_summary_report.html" ,
32+ " http://www.securityfocus.com/archive/1/489883/100/0/threaded" ,
33+ " http://www.securityfocus.com/bid/26750" ,
34+ " http://www.ubuntu.com/usn/USN-940-1" ,
35+ " http://www.vupen.com/english/advisories/2010/1192" ,
36+ " https://issues.rpath.com/browse/RPL-2012" ,
37+ ]
38+ [[snapshot .nvd ]]
39+ id = " CVE-2007-5902"
40+ published = 2007-12-06T02:46:00
41+ updated = 2025-04-09T00:30:58.490000
42+
43+ [snapshot .nvd .digest ]
44+ xxh128 = " d2652b73bf4ca422e975367c15c3f6ab"
45+
46+ [curator ]
47+ converted_from_cve5 = true
48+ needs_review = true
49+
50+ [vuln ]
51+ id = " ANCHORE-2007-6901"
52+
53+ [[vuln .providers .nvd ]]
54+ id = " CVE-2007-5902"
55+
56+ [vuln .providers .nvd .enrichment ]
57+ reason = " Add kerberos 5 affected details"
58+
59+ [[vuln .providers .nvd .products .override .cve5 ]]
60+
61+ vendor = " mit"
62+ product = " krb5"
63+ [[vuln .providers .nvd .products .override .cve5 .source ]]
64+ url = " https://github.com/krb5/krb5"
65+ [[vuln .providers .nvd .products .override .cve5 .cpe ]]
66+ vendor = " mit"
67+ product = " kerberos_5"
68+
69+ [[vuln .providers .nvd .products .override .cve5 .cpe ]]
70+ vendor = " mit"
71+ product = " krb5"
72+ [[vuln .providers .nvd .products .override .cve5 .affected ]]
73+
74+
75+ [vuln .providers .nvd .products .override .cve5 .affected .version ]
76+ scheme = " custom"
77+ greater_than_or_equal = " 0"
78+ less_than = " 1.6.3-r1"
79+ [[vuln .providers .nvd .products .override .cve5 .affected .remediation ]]
80+ version = " 1.6.3-r1"
0 commit comments