7.5
CVSSv3

CVE-2008-0063

Published: 19/03/2008 Updated: 09/02/2024
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote malicious users to obtain sensitive information, aka "Uninitialized stack values."

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5

apple mac os x

apple mac os x server

opensuse opensuse 10.2

opensuse opensuse 10.3

suse linux enterprise software development kit 10

suse linux enterprise server 10

suse linux enterprise desktop 10

suse linux 10.1

debian debian linux 3.1

debian debian linux 4.0

canonical ubuntu linux 7.04

canonical ubuntu linux 7.10

canonical ubuntu linux 6.10

canonical ubuntu linux 6.06

fedoraproject fedora 8

fedoraproject fedora 7

Vendor Advisories

It was discovered that krb5 did not correctly handle certain krb4 requests An unauthenticated remote attacker could exploit this flaw by sending a specially crafted traffic, which could expose sensitive information, cause a crash, or execute arbitrary code (CVE-2008-0062, CVE-2008-0063) ...
Several remote vulnerabilities have been discovered in the kdc component of the krb5, a system for authenticating users and services on a network The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0062 An unauthenticated remote attacker may cause a krb4-enabled KDC to crash, expose information, or execute ...

References

CWE-908http://www.securityfocus.com/archive/1/489761http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txthttp://docs.info.apple.com/article.html?artnum=307562http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:070http://www.mandriva.com/security/advisories?name=MDVSA-2008:071http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.htmlhttp://www.ubuntu.com/usn/usn-587-1http://secunia.com/advisories/29428http://secunia.com/advisories/29438http://wiki.rpath.com/Advisories:rPSA-2008-0112http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112http://www.debian.org/security/2008/dsa-1524https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200803-31.xmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:069http://www.redhat.com/support/errata/RHSA-2008-0164.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0180.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0181.htmlhttp://www.securityfocus.com/bid/28303http://www.securitytracker.com/id?1019627http://secunia.com/advisories/29420http://secunia.com/advisories/29435http://secunia.com/advisories/29450http://secunia.com/advisories/29451http://secunia.com/advisories/29457http://secunia.com/advisories/29464http://secunia.com/advisories/29423http://secunia.com/advisories/29462http://secunia.com/advisories/29516http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.htmlhttp://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.htmlhttp://secunia.com/advisories/29663http://secunia.com/advisories/29424http://www.redhat.com/support/errata/RHSA-2008-0182.htmlhttp://www.vmware.com/security/advisories/VMSA-2008-0009.htmlhttp://secunia.com/advisories/30535http://www.vupen.com/english/advisories/2008/0922/referenceshttp://www.vupen.com/english/advisories/2008/1744http://www.vupen.com/english/advisories/2008/0924/referenceshttp://www.vupen.com/english/advisories/2008/1102/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/41277https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916http://www.securityfocus.com/archive/1/493080/100/0/threadedhttp://www.securityfocus.com/archive/1/489883/100/0/threadedhttps://usn.ubuntu.com/587-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/895609