Vulnerabilities > MIT > Kerberos 5 > 1.0

DATE CVE VULNERABILITY TITLE RISK
2005-07-18 CVE-2005-1689 Double Free vulnerability in multiple products
Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.
network
low complexity
mit apple debian CWE-415
critical
9.8
2004-12-31 CVE-2004-1189 Out-Of-Bounds Write vulnerability in MIT Kerberos 5
The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.
local
low complexity
mit CWE-787
7.2
2004-10-20 CVE-2004-0772 Double Free vulnerability in multiple products
Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and earlier may allow remote attackers to execute arbitrary code.
network
low complexity
mit openpkg debian CWE-415
critical
9.8
2004-09-28 CVE-2004-0643 Double Free vulnerability in multiple products
Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code.
local
low complexity
mit debian redhat CWE-415
4.6
2004-08-18 CVE-2004-0523 Principal Name Buffer Overrun vulnerability in MIT Kerberos 5 KRB5_AName_To_Localname
Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier allow remote attackers to execute arbitrary code as root.
network
low complexity
mit sgi sun tinysofa
critical
10.0
2002-11-04 CVE-2002-1235 Remote Buffer Overflow vulnerability in Multiple Vendor kadmind
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
network
low complexity
kth mit debian
critical
10.0
2001-05-16 CVE-2001-1323 Classic Buffer Overflow vulnerability in MIT Kerberos 5
Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function.
network
low complexity
mit CWE-120
7.5
2000-06-09 CVE-2000-0550 Kerberos 4 KDC program improperly frees memory twice (aka "double-free"), which allows remote attackers to cause a denial of service.
network
low complexity
cygnus mit
5.0
2000-06-09 CVE-2000-0549 Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote attackers to cause a denial of service via a malformed request.
network
low complexity
cygnus mit
5.0
2000-06-09 CVE-2000-0548 Classic Buffer Overflow vulnerability in multiple products
Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the e_msg variable in the kerb_err_reply function.
5.0