Lucene search

K

6 matches found

CVE
CVE
added 2009/04/09 12:30 a.m.75 views

CVE-2009-0844

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

5.8CVSS6.9AI score0.0797EPSS
CVE
CVE
added 1999/09/29 4:0 a.m.62 views

CVE-1999-0143

Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys.

4.6CVSS7.3AI score0.00082EPSS
CVE
CVE
added 2007/06/11 6:30 p.m.54 views

CVE-2007-3149

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disp...

7.2CVSS6.4AI score0.00047EPSS
CVE
CVE
added 2007/12/06 2:46 a.m.52 views

CVE-2007-5902

Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.

10CVSS6.5AI score0.04002EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.51 views

CVE-1999-0713

The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges.

7.2CVSS7AI score0.00038EPSS
CVE
CVE
added 2007/12/06 2:46 a.m.46 views

CVE-2007-5894

The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initialize the length variable when auth_type has a certain value, which has unknown impact and remote authenticated attack vectors. NOTE: the original disclosure misidentifies the conditions under which the uninitial...

9.3CVSS9.1AI score0.02245EPSS