Max CVSS | 8.5 | Min CVSS | 4.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2015-2697 | 4.0 |
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field
|
02-02-2021 - 19:06 | 09-11-2015 - 03:59 | |
CVE-2015-2695 | 5.0 |
lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that
|
02-02-2021 - 19:05 | 09-11-2015 - 03:59 | |
CVE-2015-2696 | 7.1 |
lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mis
|
02-02-2021 - 18:51 | 09-11-2015 - 03:59 | |
CVE-2002-2443 | 5.0 |
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a for
|
02-02-2021 - 18:44 | 29-05-2013 - 14:29 | |
CVE-2015-2698 | 8.5 |
The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corrup
|
21-01-2020 - 15:47 | 13-11-2015 - 03:59 | |
CVE-2014-5355 | 5.0 |
MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a
|
21-01-2020 - 15:46 | 20-02-2015 - 11:59 | |
CVE-2015-2694 | 5.8 |
The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1
|
21-01-2020 - 15:46 | 25-05-2015 - 19:59 |