First published: Wed Mar 19 2008(Updated: )
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.4.11 | |
Apple iOS and macOS | =10.5.2 | |
Apple iOS and macOS | =10.4.11 | |
Apple iOS and macOS | =10.5.2 | |
Kerberos | <=1.6.3_kdc | |
Kerberos | <=1.6.3 | |
Apple iOS and macOS | <10.4.11 | |
Apple iOS and macOS | >=10.5.0<10.5.2 | |
Apple iOS and macOS | <10.4.11 | |
Apple iOS and macOS | >=10.5.0<10.5.2 | |
openSUSE | =10.2 | |
openSUSE | =10.3 | |
SUSE Linux Distribution | =10.1 | |
SUSE Linux Enterprise Desktop | =10-sp1 | |
SUSE Linux Enterprise Server | =10-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp1 | |
Debian Linux | =3.1 | |
Debian Linux | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Red Hat Fedora | =7 | |
Red Hat Fedora | =8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0063 has a medium severity rating due to potential information disclosure vulnerabilities.
To fix CVE-2008-0063, update your MIT Kerberos 5 to version 1.6.4 or later.
CVE-2008-0063 affects several versions of MIT Kerberos 5 and various Linux distributions including openSUSE and Ubuntu.
Yes, CVE-2008-0063 can be exploited remotely, allowing attackers to potentially access sensitive information.
Yes, patches are available for CVE-2008-0063 as part of the updates provided by affected distributions.