Lucene search

K
cveMitreCVE-2008-0063
HistoryMar 19, 2008 - 10:44 a.m.

CVE-2008-0063

2008-03-1910:44:00
CWE-908
mitre
web.nvd.nist.gov
41
cve-2008-0063
kerberos 4
kdc
mit kerberos 5
krb5kdc
buffer overflow
remote attack
information disclosure
uninitialized stack values
security vulnerability

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

8.6

Confidence

High

EPSS

0.043

Percentile

92.5%

The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka β€œUninitialized stack values.”

Affected configurations

Nvd
Node
mitkerberos_5Range≀1.6.3
Node
applemac_os_xRange<10.4.11
OR
applemac_os_xRange10.5.0–10.5.2
OR
applemac_os_x_serverRange<10.4.11
OR
applemac_os_x_serverRange10.5.0–10.5.2
Node
opensuseopensuseMatch10.2
OR
opensuseopensuseMatch10.3
OR
suselinuxMatch10.1
OR
suselinux_enterprise_desktopMatch10sp1
OR
suselinux_enterprise_serverMatch10sp1
OR
suselinux_enterprise_software_development_kitMatch10sp1
Node
debiandebian_linuxMatch3.1
OR
debiandebian_linuxMatch4.0
Node
canonicalubuntu_linuxMatch6.06
OR
canonicalubuntu_linuxMatch6.10
OR
canonicalubuntu_linuxMatch7.04
OR
canonicalubuntu_linuxMatch7.10
Node
fedoraprojectfedoraMatch7
OR
fedoraprojectfedoraMatch8
VendorProductVersionCPE
mitkerberos_5*cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
applemac_os_x*cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
applemac_os_x_server*cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
opensuseopensuse10.2cpe:2.3:o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
opensuseopensuse10.3cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
suselinux10.1cpe:2.3:o:suse:linux:10.1:*:*:*:*:*:*:*
suselinux_enterprise_desktop10cpe:2.3:o:suse:linux_enterprise_desktop:10:sp1:*:*:*:*:*:*
suselinux_enterprise_server10cpe:2.3:o:suse:linux_enterprise_server:10:sp1:*:*:*:*:*:*
suselinux_enterprise_software_development_kit10cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp1:*:*:*:*:*:*
debiandebian_linux3.1cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Rows per page:
1-10 of 171

References

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

8.6

Confidence

High

EPSS

0.043

Percentile

92.5%