Search for packages
purl | pkg:deb/ubuntu/heimdal@1.6~rc2%2Bdfsg-10ubuntu1 |
Next non-vulnerable version | 7.5.0+dfsg-3build1 |
Latest non-vulnerable version | 7.5.0+dfsg-3build1 |
Risk | 10.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-62bm-9r22-aaaq
Aliases: CVE-2019-12098 |
In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c. |
Affected by 0 other vulnerabilities. |
VCID-7avt-gvth-aaan
Aliases: CVE-2011-4862 |
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011. |
Affected by 4 other vulnerabilities. |
VCID-d6ye-ubu8-aaae
Aliases: CVE-2017-17439 |
In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c. |
Affected by 1 other vulnerability. |
VCID-dzmf-adws-aaaj
Aliases: CVE-2017-11103 |
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated. |
Affected by 3 other vulnerabilities. |
VCID-sfkm-67z4-aaap
Aliases: CVE-2017-6594 |
The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets. |
Affected by 2 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|