Show filters
156 Total Results
Displaying 11-20 of 156
Sort by:
Attacker Value
Unknown

CVE-2020-28196

Disclosure Date: November 06, 2020 (last updated February 22, 2025)
MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.
Attacker Value
Unknown

CVE-2020-13110

Disclosure Date: May 16, 2020 (last updated February 21, 2025)
The kerberos package before 1.0.0 for Node.js allows arbitrary code execution and privilege escalation via injection of malicious DLLs through use of the kerberos_sspi LoadLibrary() method, because of a DLL path search.
Attacker Value
Unknown

CVE-2014-8650

Disclosure Date: December 15, 2019 (last updated November 27, 2024)
python-requests-Kerberos through 0.5 does not handle mutual authentication
Attacker Value
Unknown

CVE-2019-14844

Disclosure Date: September 26, 2019 (last updated November 27, 2024)
A flaw was found in, Fedora versions of krb5 from 1.16.1 to, including 1.17.x, in the way a Kerberos client could crash the KDC by sending one of the RFC 4556 "enctypes". A remote unauthenticated user could use this flaw to crash the KDC.
Attacker Value
Unknown

CVE-2018-20217

Disclosure Date: December 26, 2018 (last updated November 08, 2023)
A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.
Attacker Value
Unknown

CVE-2017-7562

Disclosure Date: July 26, 2018 (last updated November 27, 2024)
An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances.
Attacker Value
Unknown

CVE-2018-5729

Disclosure Date: March 06, 2018 (last updated November 08, 2023)
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
Attacker Value
Unknown

CVE-2018-5730

Disclosure Date: March 06, 2018 (last updated November 08, 2023)
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
Attacker Value
Unknown

CVE-2018-5710

Disclosure Date: January 16, 2018 (last updated November 08, 2023)
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The pre-defined function "strlen" is getting a "NULL" string as a parameter value in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the Key Distribution Center (KDC), which allows remote authenticated users to cause a denial of service (NULL pointer dereference) via a modified kadmin client.
0
Attacker Value
Unknown

CVE-2018-5709

Disclosure Date: January 16, 2018 (last updated November 08, 2023)
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
0