Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
heimdal vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2017-17439
In Heimdal up to and including 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation...
Debian Debian Linux 9.0
Heimdal Project Heimdal
7.5
CVSSv3
CVE-2017-6594
The transit path validation code in Heimdal prior to 7.3 might allow malicious users to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.
Heimdal Project Heimdal
Opensuse Leap 42.2
Opensuse Leap 42.3
8.1
CVSSv3
CVE-2017-11103
Heimdal prior to 7.4 allows remote malicious users to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained ...
Heimdal Project Heimdal
Freebsd Freebsd -
Samba Samba
Apple Mac Os X
Apple Iphone Os
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
NA
CVE-2015-5913
Heimdal, as used in Apple OS X prior to 10.11, allows remote malicious users to conduct replay attacks against the SMB server via packet data that represents a Kerberos authenticated request.
Apple Mac Os X
NA
CVE-2014-1316
Heimdal, as used in Apple OS X up to and including 10.9.2, allows remote malicious users to cause a denial of service (abort and daemon exit) via ASN.1 data encountered in the Kerberos 5 protocol.
Apple Mac Os X 10.9.1
Apple Mac Os X
Apple Mac Os X 10.9
NA
CVE-2011-4862
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 up to and including 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and previous versions, Heimdal 1.5.1 and previous versions, GNU inetutils, and possibly other products allows remote malicious users...
Gnu Inetutils
Heimdal Project Heimdal
Mit Krb5-appl
Freebsd Freebsd
Fedoraproject Fedora 15
Fedoraproject Fedora 16
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Opensuse Opensuse 11.3
Opensuse Opensuse 11.4
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 9
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Software Development Kit 11
3 EDB exploits
5 Github repositories
1 Article
NA
CVE-2009-0688
Multiple buffer overflows in the CMU Cyrus SASL library prior to 2.1.23 might allow remote malicious users to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
Carnegie Mellon University Cyrus-sasl 2.1.19
Carnegie Mellon University Cyrus-sasl
Carnegie Mellon University Cyrus-sasl 1.5.24
Carnegie Mellon University Cyrus-sasl 1.5.15
Carnegie Mellon University Cyrus-sasl 1.5.16
Carnegie Mellon University Cyrus-sasl 1.5.27
Carnegie Mellon University Cyrus-sasl 1.5.3
Carnegie Mellon University Cyrus-sasl 2.0.5
Carnegie Mellon University Cyrus-sasl 2.1.0
Carnegie Mellon University Cyrus-sasl 2.1.1
Carnegie Mellon University Cyrus-sasl 2.1.16
Carnegie Mellon University Cyrus-sasl 2.1.21
Carnegie Mellon University Cyrus-sasl 2.1.20
Carnegie Mellon University Cyrus-sasl 1.5.11
Carnegie Mellon University Cyrus-sasl 1.5.13
Carnegie Mellon University Cyrus-sasl 1.5.23
Carnegie Mellon University Cyrus-sasl 1.5.26
Carnegie Mellon University Cyrus-sasl 2.0.3
Carnegie Mellon University Cyrus-sasl 2.0.4
Carnegie Mellon University Cyrus-sasl 2.1.14
Carnegie Mellon University Cyrus-sasl 2.1.15
Carnegie Mellon University Cyrus-sasl 2.1.6
NA
CVE-2009-0360
Russ Allbery pam-krb5 prior to 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching...
Eyrie Pam-krb5 3.8
Eyrie Pam-krb5 3.7
Eyrie Pam-krb5 3.0
Eyrie Pam-krb5 2.6
Eyrie Pam-krb5
Eyrie Pam-krb5 3.11
Eyrie Pam-krb5 3.4
Eyrie Pam-krb5 3.3
Eyrie Pam-krb5 2.3
Eyrie Pam-krb5 2.2
Eyrie Pam-krb5 3.10
Eyrie Pam-krb5 3.9
Eyrie Pam-krb5 3.2
Eyrie Pam-krb5 3.1
Eyrie Pam-krb5 2.1
Eyrie Pam-krb5 2.0
Eyrie Pam-krb5 3.6
Eyrie Pam-krb5 3.5
Eyrie Pam-krb5 2.5
Eyrie Pam-krb5 2.4
1 EDB exploit
NA
CVE-2009-0361
Russ Allbery pam-krb5 prior to 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME env...
Eyrie Pam-krb5 3.2
Eyrie Pam-krb5 3.3
Eyrie Pam-krb5
Eyrie Pam-krb5 3.0
Eyrie Pam-krb5 3.1
Eyrie Pam-krb5 3.6
Eyrie Pam-krb5 3.7
Eyrie Pam-krb5 3.10
Eyrie Pam-krb5 3.11
Eyrie Pam-krb5 3.8
Eyrie Pam-krb5 3.9
Eyrie Pam-krb5 3.4
Eyrie Pam-krb5 3.5
NA
CVE-2007-5939
The gss_userok function in appl/ftp/ftpd/gss_userok.c in Heimdal 0.7.2 does not allocate memory for the ticketfile pointer before calling free, which allows remote malicious users to have an unknown impact via an invalid username. NOTE: the vulnerability was originally reported f...
Heimdal Heimdal 0.7.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »