Page 10 of 51 results (0.035 seconds)

CVSS: 5.0EPSS: 7%CPEs: 1EXPL: 0

The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers. La abstracción de interfaz "mechglue" de la biblioteca GSS-API para Kerberos 5 1.5 hasta 1.5.1, tal y como se usan en el demonio de administración Kerberos (kadmind) y otros productos que utilizan esta biblioteca, permite a atacantes remotos provocar una denegación de servicio (caída) mediante vectores desconocidos que provoca que mechglue libere punteros sin inicializar. • http://fedoranews.org/cms/node/2375 http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html http://osvdb.org/31280 http://secunia.com/advisories/23690 http://secunia.com/advisories/23701 http://secunia.com/advisories/23706 http://secunia.com/advisories/23903 http://secunia.com/advisories/35151 http://security.gentoo.org/glsa/glsa-200701-21.xml http://securitytracker.com/id?1017494 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102772-1 http: •

CVSS: 9.3EPSS: 60%CPEs: 9EXPL: 0

The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. La librería RPC del Kerberos 5 1.4 hasta la 1.4.4 y de la 1.5 hasta la 1.5.1, como la usada en el demonio de administración del Kerberos (kadmind) y otros productos que utilizan esta librería, llama a un puntero de función sin inicializar en una memoria liberada, lo que permite a atacantes remotos provocar una denegación de servicio (caída) y la posibilidad de ejecutar código de su elección mediante vectores sin especificar. • http://docs.info.apple.com/article.html?artnum=305391 http://fedoranews.org/cms/node/2375 http://fedoranews.org/cms/node/2376 http://lists.apple.com/archives/Security-announce/2007/Apr/msg00001.html http://lists.suse.com/archive/suse-security-announce/2007-Jan/0004.html http://osvdb.org/31281 http://secunia.com/advisories/23667 http://secunia.com/advisories/23696 http://secunia.com/advisories/23701 http://secunia.com/advisories/23706 http://secunia.com/advisories/23707&# • CWE-824: Access of Uninitialized Pointer •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion. Las aplicaciones (1) krshd y (2) v4rcp en MIT Kerberos 5 (krb5) hasta 1.5, y 1.4.x anteriores a 1.4.4, cuando se ejecutan en Linux y AIX, no comprueban los códigos de retorno de llamadas 'setuid', lo que permite a usuarios locales fallar en soltar privilegios usando ataques como consumición de recursos. • ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt http://secunia.com/advisories/21402 http://secunia.com/advisories/21423 http://secunia.com/advisories/21436 http://secunia.com/advisories/21439 http://secunia.com/advisories/21441 http://secunia.com/advisories/21456 http://secunia.com/advisories/21461 http://secunia.com/advisories/21467 http://secunia.com/advisories/21527 http://secunia.com/advisories/21613 http://secunia.com/advisories/21847 http:& • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues. Los programas (1) ftpd y (2) ksu en MIT Kerberos 5 (krb5) actualizado a 1.5, y 1.4.X anterior a 1.4.4, no valida el código de retorno para las llamadas setuid, lo cual permite a un usuario local ganar privilegios provocando fallos del setuid para subir privilegios. NOTA: con en 20060808, no se conoce si existe un panorama explotable para estas ediciones. • ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt http://fedoranews.org/cms/node/2376 http://secunia.com/advisories/21402 http://secunia.com/advisories/21436 http://secunia.com/advisories/21439 http://secunia.com/advisories/21461 http://secunia.com/advisories/21467 http://secunia.com/advisories/21527 http://secunia.com/advisories/21613 http://secunia.com/advisories/23707 http://security.gentoo.org/glsa/glsa-200608-21.xml http://securitytracker.c • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 1

Kerberos 4 (aka krb4) allows local users to overwrite arbitrary files via a symlink attack on new ticket files. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0078.html http://www.redhat.com/support/errata/RHSA-2001-025.html •