Описание
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.4.3-5ubuntu0.7 |
devel | released | 1.6.dfsg.3~beta1-2ubuntu1 |
edgy | released | 1.4.3-9ubuntu1.6 |
feisty | released | 1.4.4-5ubuntu3.4 |
gutsy | released | 1.6.dfsg.1-7ubuntu0.1 |
upstream | pending | 1.6.4 |
Показывать по
4.3 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not pro ...
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
4.3 Medium
CVSS2
7.5 High
CVSS3