CVE-2008-0063

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."

References

http://docs.info.apple.com/article.html?artnum=307562

http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00006.html

http://secunia.com/advisories/29420

http://secunia.com/advisories/29423

http://secunia.com/advisories/29424

http://secunia.com/advisories/29428

http://secunia.com/advisories/29435

http://secunia.com/advisories/29438

http://secunia.com/advisories/29450

http://secunia.com/advisories/29451

http://secunia.com/advisories/29457

http://secunia.com/advisories/29462

http://secunia.com/advisories/29464

http://secunia.com/advisories/29516

http://secunia.com/advisories/29663

http://secunia.com/advisories/30535

http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022520.html

http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5022542.html

http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2008-001.txt

http://wiki.rpath.com/Advisories:rPSA-2008-0112

http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0112

http://www.debian.org/security/2008/dsa-1524

http://www.gentoo.org/security/en/glsa/glsa-200803-31.xml

http://www.mandriva.com/security/advisories?name=MDVSA-2008:069

http://www.mandriva.com/security/advisories?name=MDVSA-2008:070

http://www.mandriva.com/security/advisories?name=MDVSA-2008:071

http://www.redhat.com/support/errata/RHSA-2008-0164.html

http://www.redhat.com/support/errata/RHSA-2008-0180.html

http://www.redhat.com/support/errata/RHSA-2008-0181.html

http://www.redhat.com/support/errata/RHSA-2008-0182.html

http://www.securityfocus.com/archive/1/489761

http://www.securityfocus.com/archive/1/489883/100/0/threaded

http://www.securityfocus.com/archive/1/493080/100/0/threaded

http://www.securityfocus.com/bid/28303

http://www.securitytracker.com/id?1019627

http://www.ubuntu.com/usn/usn-587-1

http://www.vmware.com/security/advisories/VMSA-2008-0009.html

http://www.vupen.com/english/advisories/2008/0922/references

http://www.vupen.com/english/advisories/2008/0924/references

http://www.vupen.com/english/advisories/2008/1102/references

http://www.vupen.com/english/advisories/2008/1744

https://exchange.xforce.ibmcloud.com/vulnerabilities/41277

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8916

https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00537.html

https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00544.html

Details

Source: MITRE

Published: 2008-03-19

Updated: 2018-10-15

Type: CWE-119

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Tenable Plugins

View all (22 total)

IDNameProductFamilySeverity
67669Oracle Linux 3 : krb5 (ELSA-2008-0181)NessusOracle Linux Local Security Checks
critical
67668Oracle Linux 4 : krb5 (ELSA-2008-0180)NessusOracle Linux Local Security Checks
high
67664Oracle Linux 5 : krb5 (ELSA-2008-0164)NessusOracle Linux Local Security Checks
critical
63850RHEL 4 : krb5 (RHSA-2008:0182)NessusRed Hat Local Security Checks
high
60373Scientific Linux Security Update : krb5 on SL3.x, SL4.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
critical
43676CentOS 5 : krb5 (CESA-2008:0164)NessusCentOS Local Security Checks
critical
40378VMSA-2008-0009 : Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issuesNessusVMware ESX Local Security Checks
high
38056Mandriva Linux Security Advisory : krb5 (MDVSA-2008:069)NessusMandriva Local Security Checks
critical
37527Mandriva Linux Security Advisory : krb5 (MDVSA-2008:070)NessusMandriva Local Security Checks
critical
31671GLSA-200803-31 : MIT Kerberos 5: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
31670Fedora 8 : krb5-1.6.2-14.fc8 (2008-2647)NessusFedora Local Security Checks
critical
31668Fedora 7 : krb5-1.6.1-9.fc7 (2008-2637)NessusFedora Local Security Checks
critical
31630Debian DSA-1524-1 : krb5 - several vulnerabilitiesNessusDebian Local Security Checks
critical
31627CentOS 4 : krb5 (CESA-2008:0180)NessusCentOS Local Security Checks
high
31625Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : krb5 vulnerabilities (USN-587-1)NessusUbuntu Local Security Checks
critical
31624SuSE 10 Security Update : Kerberos 5 (ZYPP Patch Number 5082)NessusSuSE Local Security Checks
critical
31623openSUSE 10 Security Update : krb5 (krb5-5081)NessusSuSE Local Security Checks
critical
31618RHEL 2.1 / 3 : krb5 (RHSA-2008:0181)NessusRed Hat Local Security Checks
critical
31617RHEL 4 : krb5 (RHSA-2008:0180)NessusRed Hat Local Security Checks
high
31616RHEL 5 : krb5 (RHSA-2008:0164)NessusRed Hat Local Security Checks
critical
31609CentOS 3 : krb5 (CESA-2008:0181)NessusCentOS Local Security Checks
critical
31605Mac OS X Multiple Vulnerabilities (Security Update 2008-002)NessusMacOS X Local Security Checks
critical