Vulnerabilities > MIT
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2007-04-06 | CVE-2007-1216 | Double Free vulnerability in multiple products Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding". | 9.0 |
2007-04-06 | CVE-2007-0957 | Out-Of-Bounds Write vulnerability in multiple products Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers. | 9.0 |
2007-04-06 | CVE-2007-0956 | Missing Authentication for Critical Function vulnerability in multiple products The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882. | 10.0 |
2006-12-31 | CVE-2006-6144 | Unspecified vulnerability in MIT Kerberos 5 1.5/1.5.1 The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers. | 5.0 |
2006-08-09 | CVE-2006-3084 | Permissions, Privileges, and Access Controls vulnerability in multiple products The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. | 7.2 |
2006-08-09 | CVE-2006-3083 | Resource Management Errors vulnerability in multiple products The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion. | 7.2 |
2005-07-18 | CVE-2005-1689 | Double Free vulnerability in multiple products Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions. | 9.8 |
2005-07-18 | CVE-2005-1175 | Remote Single Byte Heap Overflow vulnerability in MIT Kerberos 5 Key Distribution Center Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request. | 7.5 |
2005-07-18 | CVE-2005-1174 | Remote Denial of Service vulnerability in MIT Kerberos 5 Key Distribution Center MIT Kerberos 5 (krb5) 1.3 through 1.4.1 Key Distribution Center (KDC) allows remote attackers to cause a denial of service (application crash) via a certain valid TCP connection that causes a free of unallocated memory. | 5.0 |
2005-06-14 | CVE-2005-0488 | Remote Information Disclosure vulnerability in Multiple Vendor Telnet Client Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command. | 5.0 |