CVE-2010-1323
- EPSS 4.17%
- Veröffentlicht 02.12.2010 16:22:20
- Zuletzt bearbeitet 11.04.2025 00:51:21
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distrib...
CVE-2010-0283
- EPSS 3.73%
- Veröffentlicht 22.02.2010 13:00:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.
- EPSS 16.49%
- Veröffentlicht 13.01.2010 19:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly...
CVE-2009-0847
- EPSS 12.83%
- Veröffentlicht 09.04.2009 00:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, rela...
CVE-2009-0844
- EPSS 3.56%
- Veröffentlicht 09.04.2009 00:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that tri...
- EPSS 23.24%
- Veröffentlicht 27.03.2009 16:30:02
- Zuletzt bearbeitet 09.04.2025 00:30:58
The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via in...
- EPSS 13.6%
- Veröffentlicht 18.08.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier allow remote attackers to execute arbitrary code as root.
- EPSS 2.55%
- Veröffentlicht 02.04.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes the KDC to corrupt its hea...
- EPSS 1.25%
- Veröffentlicht 02.04.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes an out-of-bounds read of a...
CVE-2003-0139
- EPSS 4.95%
- Veröffentlicht 24.03.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an attacker to create krb4 tickets for unauthorized principals using a cut-and-p...