Show filters
156 Total Results
Displaying 101-110 of 156
Sort by:
Attacker Value
Unknown
CVE-2007-3149
Disclosure Date: June 11, 2007 (last updated October 04, 2023)
sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."
0
Attacker Value
Unknown
CVE-2007-1216
Disclosure Date: April 06, 2007 (last updated October 04, 2023)
Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding".
0
Attacker Value
Unknown
CVE-2007-0957
Disclosure Date: April 06, 2007 (last updated October 04, 2023)
Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.
0
Attacker Value
Unknown
CVE-2007-0956
Disclosure Date: April 06, 2007 (last updated October 04, 2023)
The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.
0
Attacker Value
Unknown
CVE-2006-6143
Disclosure Date: December 31, 2006 (last updated February 09, 2024)
The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown
CVE-2006-6144
Disclosure Date: December 31, 2006 (last updated October 04, 2023)
The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.
0
Attacker Value
Unknown
CVE-2006-3084
Disclosure Date: August 09, 2006 (last updated October 04, 2023)
The (1) ftpd and (2) ksu programs in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which might allow local users to gain privileges by causing setuid to fail to drop privileges. NOTE: as of 20060808, it is not known whether an exploitable attack scenario exists for these issues.
0
Attacker Value
Unknown
CVE-2006-3083
Disclosure Date: August 09, 2006 (last updated October 04, 2023)
The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion.
0
Attacker Value
Unknown
CVE-2005-1175
Disclosure Date: July 18, 2005 (last updated February 22, 2025)
Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.
0
Attacker Value
Unknown
CVE-2005-1689
Disclosure Date: July 18, 2005 (last updated February 22, 2025)
Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.
0