Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2008-0063


The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."


Published

2008-03-19T10:44:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-908

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mit kerberos_5 ≤ 1.6.3 Yes
Operating System apple mac_os_x < 10.4.11 Yes
Operating System apple mac_os_x < 10.5.2 Yes
Operating System apple mac_os_x_server < 10.4.11 Yes
Operating System apple mac_os_x_server < 10.5.2 Yes
Operating System opensuse opensuse 10.2 Yes
Operating System opensuse opensuse 10.3 Yes
Operating System suse linux 10.1 Yes
Operating System suse linux_enterprise_desktop 10 Yes
Operating System suse linux_enterprise_server 10 Yes
Operating System suse linux_enterprise_software_development_kit 10 Yes
Operating System debian debian_linux 3.1 Yes
Operating System debian debian_linux 4.0 Yes
Operating System canonical ubuntu_linux 6.06 Yes
Operating System canonical ubuntu_linux 6.10 Yes
Operating System canonical ubuntu_linux 7.04 Yes
Operating System canonical ubuntu_linux 7.10 Yes
Operating System fedoraproject fedora 7 Yes
Operating System fedoraproject fedora 8 Yes

References