Description
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1524-1 | New krb5 packages fix multiple vulnerabilities |
Ubuntu USN |
USN-587-1 | Kerberos vulnerabilities |
References
History
No history.
Subscriptions
Apple
Subscribe
Mac Os X
Subscribe
Mac Os X Server
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Mit
Subscribe
Kerberos 5
Subscribe
Opensuse
Subscribe
Opensuse
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Eus
Subscribe
Suse
Subscribe
Linux
Subscribe
Linux Enterprise Desktop
Subscribe
Linux Enterprise Server
Subscribe
Linux Enterprise Software Development Kit
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T07:32:23.883Z
Reserved: 2008-01-03T00:00:00.000Z
Link: CVE-2008-0063
No data.
Status : Deferred
Published: 2008-03-19T10:44:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-0063
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN