kerberos vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://web.mit.edu|kerberos package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

[0,)
  • M
Improper Input Validation

[,1.21.3)
  • M
Improper Input Validation

[,1.21.3)
  • H
Missing Release of Memory after Effective Lifetime

[0,)
  • H
Resource Exhaustion

[0,)
  • H
Denial of Service (DoS)

[,1.20.2)[1.21.0,1.21.1)
  • M
Double Free

[,1.21.2)
  • M
Buffer Overflow

[,1.19.4)[1.20.0,1.20.1)
  • H
Buffer Overflow

[1.0,4.0]
  • L
LDAP Injection

[1.6,1.17)
  • M
Denial of Service (DoS)

[,1.7.2)[1.8.0,1.8.1)
  • M
NULL Pointer Dereference

[1.6,1.17)
  • C
Buffer Overflow

[1.0,4.0]
  • M
Denial of Service (DoS)

[,1.17)
  • H
Denial of Service (DoS)

[,1.13.1)
  • M
Denial of Service (DoS)

[1.0,1.14.1]
  • M
Cryptographic Issues

[1.8,1.8.3]
  • M
Cryptographic Issues

[1.6.3,1.9]
  • M
Denial of Service (DoS)

[1.2.2,1.3.4]
  • C
Arbitrary Code Execution

[,1.5-final)
  • M
Buffer Overflow

[,1.1-beta1)
  • H
Denial of Service (DoS)

[1.4,1.5.1]
  • M
Improper Authentication

[,1.3-alpha1)
  • H
Double Free

[,1.3.5)
  • H
Out-of-bounds Write

[,1.3.6)
  • H
Access Restriction Bypass

[1.16.1,1.17.2)
  • M
Buffer Overflow

[,1.1-beta1)
  • M
Denial of Service (DoS)

[1.6.3,1.9]
  • C
Out-of-Bounds

[1.4,1.6.3)
  • M
Out-of-bounds Read

[,1.13.4)[1.14,1.14.1)
  • C
Out-of-Bounds

[,1.15.3)
  • M
Release of Invalid Pointer or Reference

[,1.14)
  • M
Improper Input Validation

[1.7,1.9]
  • H
Out-of-Bounds

[,1.2.2]
  • M
Arbitrary Code Execution

[,1.2.2)
  • C
Improper Input Validation

[,1.6.4)
  • M
Access Restriction Bypass

[,1.13.2)
  • H
Improper Input Validation

[1.9,1.9.1]
  • M
Improper Input Validation

[,1.11.3)
  • M
Improper Authentication

[,1.16)
  • M
Access Restriction Bypass

[,1.10.1)
  • M
Improper Input Validation

[,1.8.4)
  • M
NULL Pointer Dereference

[,1.10.4)
  • C
Buffer Overflow

[1.0,4.0]
  • H
Improper Input Validation

[1.8,1.8.4]
  • H
Denial of Service (DoS)

[,1.2.5)
  • M
Denial of Service (DoS)

[1.0,1.3]
  • H
NULL Pointer Dereference

[,1.18.4)[1.19.0,1.19.2)
  • H
Improper Input Validation

[,1.9.5)
  • H
Out-of-bounds Write

[,1.6.1)
  • M
NULL Pointer Dereference

[,1.10.7)
  • H
Out-of-Bounds

[1.0.8,1.4-beta1)
  • M
Denial of Service (DoS)

[,1.7.1)
  • M
Denial of Service (DoS)

[,1.10.2)
  • M
NULL Pointer Dereference

[,1.0)
  • C
Buffer Overflow

[1.0,4.0]
  • H
Denial of Service (DoS)

[,1.10.3)
  • M
Denial of Service (DoS)

[,1.9]
  • H
Resource Management Errors

[1.7,1.9]
  • H
Improper Input Validation

[1.8,1.9.1]
  • L
Improper Input Validation

[,1.11.4)
  • M
Out-of-bounds Read

[,1.12.2)
  • C
Denial of Service (DoS)

[,1.7.1)
  • L
Cryptographic Issues

[1.7,1.8.3]
  • H
Buffer Overflow

[,1.17.2)[1.18.0,1.18.3)
  • M
Denial of Service (DoS)

[1.2.1,1.2.4]
  • H
Resource Management Errors

[,1.4.4)
  • H
Access Restriction Bypass

[,1.4.4)
  • M
Double Free

[,1.3.4)
  • H
Denial of Service (DoS)

[,1.13.4)[1.14.0,1.14.1)
  • H
Integer Overflow or Wraparound

[,1.0)
  • M
NULL Pointer Dereference

[,1.10.4)
  • H
Denial of Service (DoS)

[,1.13)
  • L
Cryptographic Issues

[1.5.4,1.8.3]
  • H
Improper Input Validation

[,1.7.2)
  • C
Out-of-Bounds

[1.4,1.6.2]
  • H
Denial of Service (DoS)

[,1.11.6)[1.12.0,1.12.2)
  • H
NULL Pointer Dereference

[,1.12.2)
  • M
NULL Pointer Dereference

[,1.13.6)[1.14.0,1.14.3)
  • M
Denial of Service (DoS)

[1.5,1.5.2)
  • M
Denial of Service (DoS)

[1.0,1.3]
  • C
Arbitrary Code Execution

[1.0,1.3.3]
  • M
NULL Pointer Dereference

[,1.18.5)[1.19.0,1.19.3)
  • H
Buffer Overflow

[,1.2.2)
  • H
Denial of Service (DoS)

[,1.13.1)
  • M
Source Code

[,1.14)
  • H
Out-of-bounds Write

[,1.6.2)
  • H
Out-of-Bounds

[1.3,1.4.1]
  • C
Buffer Overflow

[1.0,1.2.2]
  • M
Information Exposure

[,1.13.1)
  • M
Improper Input Validation

[1.5,1.7)
  • H
Access Restriction Bypass

[1.5,1.6.2]
  • H
Improper Input Validation

[1.8,1.9.1]
  • M
Improper Input Validation

[1.7,1.15.1]
  • H
Double Free

[,1.12.2)
  • C
Denial of Service (DoS)

[1.1,1.1.1]
  • M
Buffer Overflow

[,1.1-beta1)
  • M
Denial of Service (DoS)

[,1.1-beta1)
  • M
Denial of Service (DoS)

[1.1,1.13.1]
  • M
Denial of Service (DoS)

[1.3,1.4.1]
  • M
NULL Pointer Dereference

[,1.7.2)[1.8,1.8.2)
  • M
Denial of Service (DoS)

[,1.6.3]
  • C
Out-of-Bounds

[1.4,1.6.3]
  • L
Cross-site Scripting (XSS)

[,1.7]
  • L
NULL Pointer Dereference

[,1.13.1)
  • M
Improper Access Control

[,1.13.1)
  • M
NULL Pointer Dereference

[,1.10.5)
  • M
CVE-2004-0971

[,1.3.4]
  • C
Double Free

[1.14,1.15.1]
  • M
Out-of-Bounds

[,1.13)
  • H
Use After Free

[,1.13)
  • M
Resource Management Errors

[,1.8.2)
  • M
Resource Management Errors

[1.5,1.6.3]
  • M
Denial of Service (DoS)

[1.10,1.10.7]
  • M
Denial of Service (DoS)

[,1.11-alpha1)
  • H
Double Free

[,1.6.1)
  • C
Arbitrary Code Execution

[,1.6.2)
  • H
Out-of-Bounds

[,1.5]
  • H
Double Free

[,1.13)
  • H
Denial of Service (DoS)

[1.3,1.4.1]
  • M
Out-of-Bounds

[,1.6.2]
  • H
CVE-2003-0059

[,1.2.5)
  • M
Memory Leak

[,1.13.4)[1.14,1.14.1)
  • M
Information Exposure

[,1.3.4]
  • C
Buffer Overflow

[1.1.1,1.2.2]
  • L
Insufficiently Protected Credentials

[,1.13)
  • H
Arbitrary Code Execution

[,1.6.2)
  • M
Out-of-Bounds

[,1.12.2)
  • M
Out-of-bounds Read

[,1.14)
  • H
Out-of-Bounds

[,1.14]
  • C
Missing Authentication

[,1.6.1)
  • M
Denial of Service (DoS)

[,1.2.5)
  • H
Buffer Overflow

[,1.5.2]
  • C
Improper Input Validation

[1.7,1.9]
  • L
Denial of Service (DoS)

[,1.13.1)
  • H
Arbitrary Code Execution

[1.2,1.2.7]
  • H
Denial of Service (DoS)

[,krb5-1.19-beta1)