The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc)...
Moderate severity
Unreviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Feb 18, 2024
Description
Published by the National Vulnerability Database
Mar 19, 2008
Published to the GitHub Advisory Database
May 1, 2022
Last updated
Feb 18, 2024
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
References