Max CVSS | 10.0 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2007-5894 | 9.3 |
The reply function in ftpd.c in the gssftp ftpd in MIT Kerberos 5 (krb5) does not initialize the length variable when auth_type has a certain value, which has unknown impact and remote authenticated attack vectors. NOTE: the original disclosure misi
|
07-08-2024 - 16:15 | 06-12-2007 - 02:46 | |
CVE-2008-0062 | 9.3 |
KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer derefe
|
09-02-2024 - 00:42 | 19-03-2008 - 10:44 | |
CVE-2008-0063 | 4.3 |
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
|
09-02-2024 - 00:35 | 19-03-2008 - 10:44 | |
CVE-2008-0947 | 10.0 |
Buffer overflow in the RPC library used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.4 through 1.6.3 allows remote attackers to execute arbitrary code by triggering a large number of open file descriptors.
|
21-01-2020 - 15:45 | 19-03-2008 - 00:44 | |
CVE-2007-5902 | 10.0 |
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
|
21-01-2020 - 15:44 | 06-12-2007 - 02:46 | |
CVE-2007-5971 | 6.9 |
Double free vulnerability in the gss_krb5int_make_seal_token_v3 function in lib/gssapi/krb5/k5sealv3.c in MIT Kerberos 5 (krb5) has unknown impact and attack vectors. Information from Apple: http://docs.info.apple.com/article.html?artnum=307562
|
15-10-2018 - 21:48 | 06-12-2007 - 02:46 |