Vulnerabilities > MIT > Kerberos 5 > 1.6.1

DATE CVE VULNERABILITY TITLE RISK
2008-03-19 CVE-2008-0062 Improper Initialization vulnerability in multiple products
KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.
network
low complexity
mit debian canonical fedoraproject CWE-665
critical
9.8
2008-03-19 CVE-2008-0947 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in MIT Kerberos 5
Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.
network
low complexity
mit CWE-119
critical
10.0
2007-12-06 CVE-2007-5971 Resource Management Errors vulnerability in MIT Kerberos 5
Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.
local
apple mit CWE-399
6.9
2007-12-06 CVE-2007-5901 Resource Management Errors vulnerability in MIT Kerberos 5
Use-after-free vulnerability in the gss_indicate_mechs function in lib/gssapi/mechglue/g_initialize.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors.
local
apple mit CWE-399
6.9
2007-09-06 CVE-2007-4743 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in MIT Kerberos 5
The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.
network
low complexity
mit CWE-119
critical
10.0
2007-09-05 CVE-2007-3999 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in MIT Kerberos 5
Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
network
low complexity
mit CWE-119
critical
10.0
2007-06-26 CVE-2007-2798 Out-Of-Bounds Write vulnerability in multiple products
Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
network
low complexity
mit canonical debian CWE-787
critical
9.0
2007-06-26 CVE-2007-2443 Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.
low complexity
mit debian canonical
8.3
2007-04-06 CVE-2007-1216 Double Free vulnerability in multiple products
Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".
network
low complexity
mit canonical debian CWE-415
critical
9.0
2007-04-06 CVE-2007-0957 Out-Of-Bounds Write vulnerability in multiple products
Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.
network
low complexity
mit debian canonical CWE-787
critical
9.0