Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mit kerberos 5 vulnerabilities and exploits
(subscribe to this query)
5.9
CVSSv3
CVE-2019-25017
An issue exists in rcp in MIT krb5-appl up to and including 1.0.3. Due to the rcp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the rcp client only performs cursory validation of the object name returned (o...
Mit Krb5-appl
5.3
CVSSv3
CVE-2018-20217
A Reachable Assertion issue exists in the KDC in MIT Kerberos 5 (aka krb5) prior to 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.
Mit Kerberos
Debian Debian Linux 8.0
Debian Debian Linux 9.0
3.7
CVSSv3
CVE-2010-1324
MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x up to and including 1.8.3 does not properly determine the acceptability of checksums, which might allow remote malicious users to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unke...
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.7.1
Mit Kerberos 5 1.7
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8
3.7
CVSSv3
CVE-2010-1323
MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x up to and including 1.8.3 does not properly determine the acceptability of checksums, which might allow remote malicious users to modify user-visible prompt text, modify a response to a Key Distribution Center...
Mit Kerberos 5 1.3.5
Mit Kerberos 5 1.3.6
Mit Kerberos 5 1.5
Mit Kerberos 5 1.5.1
Mit Kerberos 5 1.7.1
Mit Kerberos 5 1.8
Mit Kerberos 5 1.3.1
Mit Kerberos 5 1.3.2
Mit Kerberos 5 1.4.1
Mit Kerberos 5 1.4.2
Mit Kerberos 5 1.6
Mit Kerberos 5 1.6.1
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.3.3
Mit Kerberos 5 1.3.4
Mit Kerberos 5 1.4.3
Mit Kerberos 5 1.4.4
Mit Kerberos 5 1.6.2
Mit Kerberos 5 1.7
Mit Kerberos 5 1.3
Mit Kerberos 5 1.4
Mit Kerberos 5 1.5.2
NA
CVE-2015-2698
The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspeci...
Mit Kerberos 5 1.14
NA
CVE-2015-2695
lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) prior to 1.14 relies on an inappropriate context handle, which allows remote malicious users to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during ...
Mit Kerberos 5
Oracle Solaris 11.3
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 15.10
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Opensuse Leap 42.1
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 12
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Software Development Kit 12
NA
CVE-2015-2696
lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) prior to 1.14 relies on an inappropriate context handle, which allows remote malicious users to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_i...
Mit Kerberos 5
Opensuse Leap 42.1
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Server 12
Suse Linux Enterprise Software Development Kit 12
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 15.10
NA
CVE-2015-2697
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) prior to 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS requ...
Mit Kerberos 5
Oracle Solaris 11.3
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 15.10
Debian Debian Linux 7.0
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Opensuse Leap 42.1
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Suse Linux Enterprise Desktop 12
Suse Linux Enterprise Server 12
Suse Linux Enterprise Software Development Kit 12
NA
CVE-2014-5355
MIT Kerberos 5 (aka krb5) up to and including 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote malicious users to (1) cause a denial of service (NULL pointer dereference) via a ze...
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.2.3
Mit Kerberos 5 1.3
Mit Kerberos 5 1.3.1
Mit Kerberos 5 1.4.1
Mit Kerberos 5 1.4.2
Mit Kerberos 5 1.6.1
Mit Kerberos 5 1.6.2
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.5
Mit Kerberos 5 1.10
Mit Kerberos 5 1.10.1
Mit Kerberos 5 1.10.2
Mit Kerberos 5 1.11.4
Mit Kerberos 5 1.11.5
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2.6
Mit Kerberos 5 1.2.7
Mit Kerberos 5 1.3.4
Mit Kerberos 5 1.3.5
Mit Kerberos 5 1.5.1
Mit Kerberos 5 1.5.2
NA
CVE-2014-5354
plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x prior to 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a key...
Mit Kerberos 5 1.13
Mit Kerberos 5 1.12.1
Mit Kerberos 5 1.12
Mit Kerberos 5 1.12.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »