Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2008-0063

Disclosure Date: March 19, 2008
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka “Uninitialized stack values.”

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
3.6
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
None
Availability (A):
None

General Information

Vendors

  • apple,
  • canonical,
  • debian,
  • fedoraproject,
  • mit,
  • opensuse,
  • suse

Products

  • debian linux 3.1,
  • debian linux 4.0,
  • fedora 7,
  • fedora 8,
  • kerberos 5,
  • linux 10.1,
  • linux enterprise desktop 10,
  • linux enterprise server 10,
  • linux enterprise software development kit 10,
  • mac os x,
  • mac os x server,
  • opensuse 10.2,
  • opensuse 10.3,
  • ubuntu linux 6.06,
  • ubuntu linux 6.10,
  • ubuntu linux 7.04,
  • ubuntu linux 7.10

References

Advisory

Additional Info

Technical Analysis