Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mit kerberos 5 - vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0060
Format string vulnerabilities in the logging routines for MIT Kerberos V5 Key Distribution Center (KDC) prior to 1.2.5 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in Kerberos principal names.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.2.3
Mit Kerberos 5 1.2.4
NA
CVE-2014-5354
plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x prior to 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a key...
Mit Kerberos 5 1.13
Mit Kerberos 5 1.12
Mit Kerberos 5 1.12.1
Mit Kerberos 5 1.12.2
NA
CVE-2010-1320
Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x prior to 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated wit...
Mit Kerberos 5 1.7
Mit Kerberos 5 1.7.1
Mit Kerberos 5 1.8
Mit Kerberos 5 1.8.1
1 EDB exploit
NA
CVE-2010-1322
The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x prior to 1.8.4 does not properly manage an index into an authorization-data list, which allows remote malicious users to cause a denial of service (daemon crash),...
Mit Kerberos 5 1.8
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8.3
NA
CVE-2002-0036
Integer signedness error in MIT Kerberos V5 ASN.1 decoder before krb5 1.2.5 allows remote malicious users to cause a denial of service via a large unsigned data element length, which is later used as a negative value.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.2.3
Mit Kerberos 5 1.2.4
NA
CVE-2013-1417
do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 prior to 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-re...
Mit Kerberos 5 1.11
Mit Kerberos 5 1.11.1
Mit Kerberos 5 1.11.2
Mit Kerberos 5 1.11.3
NA
CVE-2006-3083
The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x prior to 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and previous versions, do not check return codes for setuid calls, which allows local users to gain privileges by causin...
Heimdal Heimdal 0.7.2
Mit Kerberos 5 1.4
Mit Kerberos 5 1.4.1
Mit Kerberos 5 1.4.2
Mit Kerberos 5 1.4.3
Mit Kerberos 5 1.5
NA
CVE-2010-4022
The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote malicious users to cause a de...
Mit Kerberos 5 1.7
Mit Kerberos 5 1.8
Mit Kerberos 5 1.9
NA
CVE-2010-0283
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 prior to 1.7.2, and 1.8 alpha, allows remote malicious users to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.
Mit Kerberos 5-1.8
Mit Kerberos 5 1.7
Mit Kerberos 5 1.7.1
NA
CVE-2012-1014
The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x prior to 1.10.3 does not initialize a certain structure member, which allows remote malicious users to cause a denial of service (uninitialized pointer dereference and daemon cras...
Mit Kerberos 5 1.10
Mit Kerberos 5 1.10.1
Mit Kerberos 5 1.10.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »