Mit

Kerberos 5

140 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 25.06%
  • Veröffentlicht 31.12.2006 05:00:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attacke...

  • EPSS 21.93%
  • Veröffentlicht 31.12.2006 05:00:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) v...

  • EPSS 0.07%
  • Veröffentlicht 09.08.2006 10:04:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain pr...

  • EPSS 0.41%
  • Veröffentlicht 09.08.2006 10:04:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fai...

  • EPSS 40.93%
  • Veröffentlicht 18.07.2005 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

MIT Kerberos 5 (krb5) 1.3 through 1.4.1 Key Distribution Center (KDC) allows remote attackers to cause a denial of service (application crash) via a certain valid TCP connection that causes a free of unallocated memory.

  • EPSS 45.4%
  • Veröffentlicht 18.07.2005 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP req...

  • EPSS 55.2%
  • Veröffentlicht 18.07.2005 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.

  • EPSS 11.68%
  • Veröffentlicht 14.06.2005 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.

  • EPSS 0.11%
  • Veröffentlicht 09.02.2005 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.

  • EPSS 0.09%
  • Veröffentlicht 31.12.2004 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an arr...