First published: Wed Mar 19 2008(Updated: )
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | =10.4.11 | |
Apple Mac OS X | =10.5.2 | |
Apple Mac OS X Server | =10.4.11 | |
Apple Mac OS X Server | =10.5.2 | |
MIT Kerberos 5 | <=1.6.3_kdc | |
MIT Kerberos 5 | <=1.6.3 | |
Apple Mac OS X | <10.4.11 | |
Apple Mac OS X | >=10.5.0<10.5.2 | |
Apple Mac OS X Server | <10.4.11 | |
Apple Mac OS X Server | >=10.5.0<10.5.2 | |
openSUSE openSUSE | =10.2 | |
openSUSE openSUSE | =10.3 | |
Suse Linux | =10.1 | |
SUSE Linux Enterprise Desktop | =10-sp1 | |
SUSE Linux Enterprise Server | =10-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp1 | |
Debian Debian Linux | =3.1 | |
Debian Debian Linux | =4.0 | |
Canonical Ubuntu Linux | =6.06 | |
Canonical Ubuntu Linux | =6.10 | |
Canonical Ubuntu Linux | =7.04 | |
Canonical Ubuntu Linux | =7.10 | |
Fedoraproject Fedora | =7 | |
Fedoraproject Fedora | =8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.