First published: Wed Mar 19 2008(Updated: )
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.4.11 | |
macOS Yosemite | =10.5.2 | |
Apple Mac OS X Server | =10.4.11 | |
Apple Mac OS X Server | =10.5.2 | |
MIT Kerberos 5 | <=1.6.3_kdc | |
MIT Kerberos 5 | <=1.6.3 | |
macOS Yosemite | <10.4.11 | |
macOS Yosemite | >=10.5.0<10.5.2 | |
Apple Mac OS X Server | <10.4.11 | |
Apple Mac OS X Server | >=10.5.0<10.5.2 | |
openSUSE | =10.2 | |
openSUSE | =10.3 | |
SUSE Linux | =10.1 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp1 | |
SUSE Linux Enterprise Server | =10-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp1 | |
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =6.10 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Fedoraproject Fedora | =7 | |
Fedoraproject Fedora | =8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0063 has a medium severity rating due to potential information disclosure vulnerabilities.
To fix CVE-2008-0063, update your MIT Kerberos 5 to version 1.6.4 or later.
CVE-2008-0063 affects several versions of MIT Kerberos 5 and various Linux distributions including openSUSE and Ubuntu.
Yes, CVE-2008-0063 can be exploited remotely, allowing attackers to potentially access sensitive information.
Yes, patches are available for CVE-2008-0063 as part of the updates provided by affected distributions.