The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote malicious users to obtain sensitive information, aka "Uninitialized stack values."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mit kerberos 5 |
||
apple mac os x |
||
apple mac os x server |
||
opensuse opensuse 10.2 |
||
opensuse opensuse 10.3 |
||
suse linux enterprise software development kit 10 |
||
suse linux enterprise server 10 |
||
suse linux enterprise desktop 10 |
||
suse linux 10.1 |
||
debian debian linux 3.1 |
||
debian debian linux 4.0 |
||
canonical ubuntu linux 7.04 |
||
canonical ubuntu linux 7.10 |
||
canonical ubuntu linux 6.10 |
||
canonical ubuntu linux 6.06 |
||
fedoraproject fedora 8 |
||
fedoraproject fedora 7 |