Vulnerabilities > MIT > Kerberos 5 > 1.4.4
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2007-06-26 | CVE-2007-2798 | Out-Of-Bounds Write vulnerability in multiple products Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal. | 9.0 |
2007-06-26 | CVE-2007-2443 | Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value. | 8.3 |
2007-04-06 | CVE-2007-1216 | Double Free vulnerability in multiple products Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding". | 9.0 |
2007-04-06 | CVE-2007-0957 | Out-Of-Bounds Write vulnerability in multiple products Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers. | 9.0 |
2007-04-06 | CVE-2007-0956 | Missing Authentication for Critical Function vulnerability in multiple products The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882. | 10.0 |