
CVE-2013-1416 – krb5: NULL pointer dereference (DoS, KDC crash) by processing certain TGS requests
https://notcve.org/view.php?id=CVE-2013-1416
19 Apr 2013 — The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request. La función prep_reprocess_req en do_tgs_req.c en el Key Distribution Center (KDC) en MIT Kerberos 5 (aka krb5) antes de v1.10.5 no realiza correctamente el servicio ámbito de refer... • http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600 • CWE-476: NULL Pointer Dereference •

CVE-2012-1016 – krb5: PKINIT null pointer deref leads to DoS
https://notcve.org/view.php?id=CVE-2012-1016
03 Mar 2013 — The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request. La función pkinit_server_return_padata en plugins/preauth/pkinit/pkinit_srv.c en la implementación PKINIT en el Ke... • http://krbdev.mit.edu/rt/Ticket/Display.html?id=7527 • CWE-476: NULL Pointer Dereference •

CVE-2013-1415 – krb5: PKINIT null pointer deref leads to DoS (pkinit_check_kdc_pkid())
https://notcve.org/view.php?id=CVE-2013-1415
03 Mar 2013 — The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request. La función pkinit_check_kdc_pkid en plugins / PRE... • http://krbdev.mit.edu/rt/Ticket/Display.html?id=7570 • CWE-476: NULL Pointer Dereference •

CVE-2011-0285 – MIT Kerberos 5 - kadmind Change Password Feature Remote Code Execution
https://notcve.org/view.php?id=CVE-2011-0285
15 Apr 2011 — The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition. La función process_chpw_request de schpw.c en la funcionalidad de cambio de contraseña de kadmind de MIT Kerberos 5 (krb5) 1.7 hasta la 1.9 libera un puntero inválido, lo que permite a ataca... • https://www.exploit-db.com/exploits/35606 • CWE-20: Improper Input Validation •

CVE-2011-0284 – (krb5kdc): Double-free flaw by handling error messages upon receiving certain AS_REQ's (MITKRB5-SA-2011-003)
https://notcve.org/view.php?id=CVE-2011-0284
20 Mar 2011 — Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data. Doble Vulnerabilidad libre en la función prepare_error_as en do_as_req.c en el Key Distribution Center (KDC) en MIT Kerberos 5 (también conocido como krb5) v1.7 hasta v1.9, ... • http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html • CWE-399: Resource Management Errors •

CVE-2010-4022 – krb5: kpropd unexpected termination on invalid input (MITKRB5-SA-2011-001)
https://notcve.org/view.php?id=CVE-2010-4022
10 Feb 2011 — The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors. La función do_standalone en MIT krb5 KDC del demonio de propagación de la base de datos (kpropd) en Kerberos v1.7, v1.8 y... • http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html • CWE-20: Improper Input Validation •

CVE-2011-0281 – krb5: KDC hang when using LDAP backend caused by special principal name (MITKRB5-SA-2011-002)
https://notcve.org/view.php?id=CVE-2011-0281
10 Feb 2011 — The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence. La implementación unparse en el Key Distribution Center (KDC) de MIT Kerberos v5 (también conocido como krb5) v1.6.x a v1.9, cuando se usa un backend LDAP, permite a a... • http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html • CWE-310: Cryptographic Issues •

CVE-2011-0282 – krb5: KDC crash when using LDAP backend caused by a special principal name (MITKRB5-SA-2011-002)
https://notcve.org/view.php?id=CVE-2011-0282
10 Feb 2011 — The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name. El Key Distribution Center (KDC) en MIT Kerberos 5 (también conocido como krb5) v1.6.x hasta v1.9 cuando un se utiliza un backend LDAP, permite a atacantes remotos provocar una denegación de servicio (desreferencia a puntero nulo o sobre-lectura, y caí... • http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html •

CVE-2010-1323 – krb5: incorrect acceptance of certain checksums (MITKRB5-SA-2010-007)
https://notcve.org/view.php?id=CVE-2010-1323
02 Dec 2010 — MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. MIT Kerberos 5 (también conocido como krb5) v1.3.x, v1.4.x, v1.5.x, v1.6.x, v1.7.x, y v1.8.x hasta v1.8.3 no determina correctamente la aceptabilidad ... • http://kb.vmware.com/kb/1035108 • CWE-310: Cryptographic Issues •

CVE-2010-1324 – krb5: multiple checksum handling vulnerabilities (MITKRB5-SA-2010-007)
https://notcve.org/view.php?id=CVE-2010-1324
02 Dec 2010 — MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key. MIT Kerberos 5 (también conocido como krb5) v1.7.x y v1.8.x hasta v1.8.3 no determina correctamente la aceptabilidad de las sumas de comprobación, lo que podría permitir a un ... • http://kb.vmware.com/kb/1035108 • CWE-310: Cryptographic Issues •