
CVE-2006-3083
https://notcve.org/view.php?id=CVE-2006-3083
09 Aug 2006 — The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion. Las aplicaciones (1) krshd y (2) v4rcp en MIT Kerberos 5 (krb5) hasta 1.5, y 1.4.x anteriores a 1.4.4, cuando se ejecutan en Linux y AIX, no comprueban los códigos d... • ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt • CWE-399: Resource Management Errors •

CVE-2006-3084
https://notcve.org/view.php?id=CVE-2006-3084
09 Aug 2006 — The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues. Los programas (1) ftpd y (2) ksu en MIT Kerberos 5 (krb5) actualizado a 1.5, y 1.4.X anterior a 1.4.4, no valida el código de retorno para... • ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2005-1689
https://notcve.org/view.php?id=CVE-2005-1689
17 Jul 2005 — Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions. Vulnerabilidad de doble liberación de memoria en la función krb5_recvauth en MIT Kerberos 5 (krb5) 1.4.1 y anteriores permite que atacantes remotos ejecuten código arbitrario mediante ciertas condiciones de error. • ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc • CWE-415: Double Free •

CVE-2005-1175
https://notcve.org/view.php?id=CVE-2005-1175
17 Jul 2005 — Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request. Desbordamiento de búfer en MIT Kerberos 5 (krb5) 1.3 hasta la 1.4.1 Key Distribution Center (KDC) permite que atacantes remotos causen una denegación de servicio (caída de la aplicación) y posiblmente ejecuten código arbitrario mediante cierta petición vál... • ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc •

CVE-2005-1174
https://notcve.org/view.php?id=CVE-2005-1174
16 Jul 2005 — MIT Kerberos 5 (krb5) 1.3 through 1.4.1 Key Distribution Center (KDC) allows remote attackers to cause a denial of service (application crash) via a certain valid TCP connection that causes a free of unallocated memory. MIT Kerberos 5 (krb5) 1.3 hasta la 1.4.1 Key Distribution Center (KDC) permite que atacantes remotos causen una denegación de servicio (caída de la aplicación) mediante ciertas conexiones válidas de TCP que provocan la liberación de memoria no reservada. • ftp://patches.sgi.com/support/free/security/advisories/20050703-01-U.asc •

CVE-2005-0488
https://notcve.org/view.php?id=CVE-2005-0488
14 Jun 2005 — Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command. • http://idefense.com/application/poi/display?id=260&type=vulnerabilities •

CVE-2004-1189
https://notcve.org/view.php?id=CVE-2004-1189
31 Dec 2004 — The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000917 • CWE-787: Out-of-bounds Write •

CVE-2004-0971
https://notcve.org/view.php?id=CVE-2004-0971
20 Oct 2004 — The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304 •

CVE-2004-0642
https://notcve.org/view.php?id=CVE-2004-0642
10 Sep 2004 — Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code. Vulnerabilidades de liberación doble en el código de manejo de errores de ASN.1 en (1) la librería del Centro de Distribución de Claves (KDC) y (2) librería de cliente de MIT Kerberos 5 (krb5) 1.3.4 y anteriores puede permitir a atacantes remotos ejecutar código arbit... • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 • CWE-415: Double Free •

CVE-2004-0643
https://notcve.org/view.php?id=CVE-2004-0643
10 Sep 2004 — Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code. Vulnerabilidad de doble liberación de memoria en la función krb5_rd_cred de MIT Kerberos 5 (krb5) 1.3.1 y anteriores pueden permitir a usuarios locales ejecutar código de su elección. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860 • CWE-415: Double Free •