Heimdal Project

Heimdal

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Published 27.03.2023 22:15:11
  • Last modified 24.02.2025 19:15:12

The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash.

  • EPSS 0.06%
  • Published 06.03.2023 23:15:11
  • Last modified 06.03.2025 21:15:13

The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and p...

  • EPSS 0.33%
  • Published 26.12.2022 05:15:10
  • Last modified 14.04.2025 16:15:18

Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept.

Exploit
  • EPSS 8.74%
  • Published 25.12.2022 06:15:09
  • Last modified 14.04.2025 19:15:31

PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-b...

  • EPSS 1.96%
  • Published 25.12.2022 05:15:11
  • Last modified 15.04.2025 14:15:35

Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).

  • EPSS 0.23%
  • Published 15.11.2022 23:15:27
  • Last modified 21.11.2024 07:24:03

Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well...

  • EPSS 2.41%
  • Published 31.07.2019 15:15:11
  • Last modified 21.11.2024 03:53:28

A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept th...

  • EPSS 3.73%
  • Published 15.05.2019 23:29:00
  • Last modified 21.11.2024 04:22:11

In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c.

  • EPSS 9.18%
  • Published 06.12.2017 15:29:00
  • Last modified 20.04.2025 01:37:25

In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading...

  • EPSS 0.25%
  • Published 28.08.2017 19:29:01
  • Last modified 20.04.2025 01:37:25

The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.