- EPSS 39.32%
- Published 26.06.2007 22:30:00
- Last modified 09.04.2025 00:30:58
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cl...
CVE-2007-2443
- EPSS 25.36%
- Published 26.06.2007 22:30:00
- Last modified 09.04.2025 00:30:58
Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.
- EPSS 14.89%
- Published 26.06.2007 22:30:00
- Last modified 09.04.2025 00:30:58
Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
CVE-2007-3149
- EPSS 0.05%
- Published 11.06.2007 18:30:00
- Last modified 09.04.2025 00:30:58
sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment...
- EPSS 37.59%
- Published 06.04.2007 01:19:00
- Last modified 09.04.2025 00:30:58
The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.
- EPSS 13.22%
- Published 06.04.2007 01:19:00
- Last modified 09.04.2025 00:30:58
Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitr...
- EPSS 11.52%
- Published 06.04.2007 01:19:00
- Last modified 09.04.2025 00:30:58
Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows r...
CVE-2006-6143
- EPSS 28.98%
- Published 31.12.2006 05:00:00
- Last modified 09.04.2025 00:30:58
The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attacke...
- EPSS 27.2%
- Published 31.12.2006 05:00:00
- Last modified 09.04.2025 00:30:58
The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) v...
CVE-2006-3083
- EPSS 0.07%
- Published 09.08.2006 10:04:00
- Last modified 03.04.2025 01:03:51
The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain pr...