CVE-2022-42898
- EPSS 8.28%
- Veröffentlicht 25.12.2022 06:15:09
- Zuletzt bearbeitet 14.04.2025 19:15:31
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-b...
CVE-2022-39028
- EPSS 0.37%
- Veröffentlicht 30.08.2022 05:15:08
- Zuletzt bearbeitet 21.11.2024 07:17:24
telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain avai...
CVE-2021-37750
- EPSS 0.72%
- Veröffentlicht 23.08.2021 05:15:08
- Zuletzt bearbeitet 21.11.2024 06:15:52
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
CVE-2021-36222
- EPSS 6.62%
- Veröffentlicht 22.07.2021 18:15:23
- Zuletzt bearbeitet 21.11.2024 06:13:20
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return valu...
CVE-2020-28196
- EPSS 1.29%
- Veröffentlicht 06.11.2020 08:15:13
- Zuletzt bearbeitet 03.12.2025 19:15:52
MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.
CVE-2019-14844
- EPSS 11.7%
- Veröffentlicht 26.09.2019 12:15:11
- Zuletzt bearbeitet 21.11.2024 04:27:29
A flaw was found in, Fedora versions of krb5 from 1.16.1 to, including 1.17.x, in the way a Kerberos client could crash the KDC by sending one of the RFC 4556 "enctypes". A remote unauthenticated user could use this flaw to crash the KDC.
CVE-2017-7562
- EPSS 0.43%
- Veröffentlicht 26.07.2018 15:29:00
- Zuletzt bearbeitet 21.11.2024 03:32:10
An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary prin...
CVE-2018-5729
- EPSS 0.08%
- Veröffentlicht 06.03.2018 20:29:00
- Zuletzt bearbeitet 05.05.2025 14:14:33
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to th...
CVE-2018-5730
- EPSS 0.43%
- Veröffentlicht 06.03.2018 20:29:00
- Zuletzt bearbeitet 05.05.2025 14:12:56
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string w...
CVE-2017-15088
- EPSS 3.7%
- Veröffentlicht 23.11.2017 17:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applicatio...