Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Kerberos
(Mit)Repositories | https://github.com/krb5/krb5 |
#Vulnerabilities | 33 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2000-06-09 | CVE-2000-0550 | Kerberos 4 KDC program improperly frees memory twice (aka "double-free"), which allows remote attackers to cause a denial of service. | Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5 | N/A | ||
2000-06-09 | CVE-2000-0549 | Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote attackers to cause a denial of service via a malformed request. | Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5 | N/A | ||
2000-05-16 | CVE-2000-0392 | Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges. | Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5, Linux | N/A | ||
2000-05-16 | CVE-2000-0391 | Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges. | Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5, Linux | N/A | ||
2000-05-16 | CVE-2000-0390 | Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges. | Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5, Linux | N/A | ||
2000-05-16 | CVE-2000-0389 | Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges. | Cygnus_network_security, Kerbnet, Kerberos, Kerberos_5, Linux | N/A | ||
2009-04-08 | CVE-2009-0847 | The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic. | Kerberos | N/A | ||
2003-03-24 | CVE-2003-0139 | Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an attacker to create krb4 tickets for unauthorized principals using a cut-and-paste attack and "ticket splicing." | Kerberos | N/A | ||
2003-03-24 | CVE-2003-0138 | Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack. | Kerberos | N/A | ||
1998-11-05 | CVE-1999-1321 | Buffer overflow in ssh 1.2.26 client with Kerberos V enabled could allow remote attackers to cause a denial of service or execute arbitrary commands via a long DNS hostname that is not properly handled during TGT ticket passing. | Kerberos | N/A |