Page 4 of 38 results (0.006 seconds)

CVSS: 9.8EPSS: 24%CPEs: 7EXPL: 0

20 Mar 2011 — Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data. Doble Vulnerabilidad libre en la función prepare_error_as en do_as_req.c en el Key Distribution Center (KDC) en MIT Kerberos 5 (también conocido como krb5) v1.7 hasta v1.9, ... • http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 8%CPEs: 3EXPL: 0

10 Feb 2011 — The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors. La función do_standalone en MIT krb5 KDC del demonio de propagación de la base de datos (kpropd) en Kerberos v1.7, v1.8 y... • http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 11%CPEs: 11EXPL: 0

10 Feb 2011 — The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence. La implementación unparse en el Key Distribution Center (KDC) de MIT Kerberos v5 (también conocido como krb5) v1.6.x a v1.9, cuando se usa un backend LDAP, permite a a... • http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html • CWE-310: Cryptographic Issues •

CVSS: 7.5EPSS: 10%CPEs: 11EXPL: 0

10 Feb 2011 — The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name. El Key Distribution Center (KDC) en MIT Kerberos 5 (también conocido como krb5) v1.6.x hasta v1.9 cuando un se utiliza un backend LDAP, permite a atacantes remotos provocar una denegación de servicio (desreferencia a puntero nulo o sobre-lectura, y caí... • http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html •

CVSS: 6.3EPSS: 0%CPEs: 4EXPL: 0

02 Dec 2010 — MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations. MIT Kerberos 5 (también conocido como krb5) v1.8.x hasta v1.8.3 no rechaza las sumas de comprobación RC4 (clave de derivación), lo que podría permitir a usuarios remotos autenticados falsif... • http://kb.vmware.com/kb/1035108 • CWE-310: Cryptographic Issues •

CVSS: 3.7EPSS: 4%CPEs: 27EXPL: 0

02 Dec 2010 — MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys. MIT Kerberos 5 (también conocido como krb5) v1.3.x, v1.4.x, v1.5.x, v1.6.x, v1.7.x, y v1.8.x hasta v1.8.3 no determina correctamente la aceptabilidad ... • http://kb.vmware.com/kb/1035108 • CWE-310: Cryptographic Issues •

CVSS: 4.3EPSS: 3%CPEs: 6EXPL: 0

02 Dec 2010 — MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key. MIT Kerberos 5 (también conocido como krb5) v1.7.x y v1.8.x hasta v1.8.3 no determina correctamente la aceptabilidad de las sumas de comprobación, lo que podría permitir a un ... • http://kb.vmware.com/kb/1035108 • CWE-310: Cryptographic Issues •

CVSS: 9.1EPSS: 1%CPEs: 4EXPL: 0

07 Oct 2010 — The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client. La función... • http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html • CWE-20: Improper Input Validation •