Mit

Kerberos 5

140 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 8.28%
  • Veröffentlicht 25.12.2022 06:15:09
  • Zuletzt bearbeitet 14.04.2025 19:15:31

PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-b...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 30.08.2022 05:15:08
  • Zuletzt bearbeitet 21.11.2024 07:17:24

telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain avai...

  • EPSS 0.72%
  • Veröffentlicht 23.08.2021 05:15:08
  • Zuletzt bearbeitet 21.11.2024 06:15:52

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.

  • EPSS 6.62%
  • Veröffentlicht 22.07.2021 18:15:23
  • Zuletzt bearbeitet 21.11.2024 06:13:20

ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return valu...

  • EPSS 1.29%
  • Veröffentlicht 06.11.2020 08:15:13
  • Zuletzt bearbeitet 03.12.2025 19:15:52

MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.

  • EPSS 11.7%
  • Veröffentlicht 26.09.2019 12:15:11
  • Zuletzt bearbeitet 21.11.2024 04:27:29

A flaw was found in, Fedora versions of krb5 from 1.16.1 to, including 1.17.x, in the way a Kerberos client could crash the KDC by sending one of the RFC 4556 "enctypes". A remote unauthenticated user could use this flaw to crash the KDC.

  • EPSS 0.43%
  • Veröffentlicht 26.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:32:10

An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary prin...

  • EPSS 0.08%
  • Veröffentlicht 06.03.2018 20:29:00
  • Zuletzt bearbeitet 05.05.2025 14:14:33

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to th...

  • EPSS 0.43%
  • Veröffentlicht 06.03.2018 20:29:00
  • Zuletzt bearbeitet 05.05.2025 14:12:56

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string w...

  • EPSS 3.7%
  • Veröffentlicht 23.11.2017 17:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applicatio...