Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
heimdal project heimdal vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2022-41916
Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions before 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applica...
Heimdal Project Heimdal
Debian Debian Linux 10.0
Debian Debian Linux 11.0
8.8
CVSSv3
CVE-2022-42898
PAC parsing in MIT Kerberos 5 (aka krb5) prior to 1.19.4 and 1.20.x prior to 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and...
Mit Kerberos 5
Mit Kerberos 5 1.20
Heimdal Project Heimdal
Samba Samba
8.1
CVSSv3
CVE-2017-11103
Heimdal prior to 7.4 allows remote malicious users to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained ...
Heimdal Project Heimdal
Freebsd Freebsd -
Samba Samba
Apple Mac Os X
Apple Iphone Os
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
7.4
CVSSv3
CVE-2019-12098
In the client side of Heimdal prior to 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c.
Heimdal Project Heimdal
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Opensuse Leap 42.3
Opensuse Leap 15.0
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Debian Debian Linux 9.0
NA
CVE-2009-0361
Russ Allbery pam-krb5 prior to 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME env...
Eyrie Pam-krb5 3.2
Eyrie Pam-krb5 3.3
Eyrie Pam-krb5
Eyrie Pam-krb5 3.0
Eyrie Pam-krb5 3.1
Eyrie Pam-krb5 3.6
Eyrie Pam-krb5 3.7
Eyrie Pam-krb5 3.10
Eyrie Pam-krb5 3.11
Eyrie Pam-krb5 3.8
Eyrie Pam-krb5 3.9
Eyrie Pam-krb5 3.4
Eyrie Pam-krb5 3.5
NA
CVE-2011-4862
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 up to and including 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and previous versions, Heimdal 1.5.1 and previous versions, GNU inetutils, and possibly other products allows remote malicious users...
Gnu Inetutils
Heimdal Project Heimdal
Mit Krb5-appl
Freebsd Freebsd
Fedoraproject Fedora 15
Fedoraproject Fedora 16
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Opensuse Opensuse 11.3
Opensuse Opensuse 11.4
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 9
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Software Development Kit 11
3 EDB exploits
5 Github repositories
1 Article
NA
CVE-2009-0360
Russ Allbery pam-krb5 prior to 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching...
Eyrie Pam-krb5 3.8
Eyrie Pam-krb5 3.7
Eyrie Pam-krb5 3.0
Eyrie Pam-krb5 2.6
Eyrie Pam-krb5
Eyrie Pam-krb5 3.11
Eyrie Pam-krb5 3.4
Eyrie Pam-krb5 3.3
Eyrie Pam-krb5 2.3
Eyrie Pam-krb5 2.2
Eyrie Pam-krb5 3.10
Eyrie Pam-krb5 3.9
Eyrie Pam-krb5 3.2
Eyrie Pam-krb5 3.1
Eyrie Pam-krb5 2.1
Eyrie Pam-krb5 2.0
Eyrie Pam-krb5 3.6
Eyrie Pam-krb5 3.5
Eyrie Pam-krb5 2.5
Eyrie Pam-krb5 2.4
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2