cve_id stringlengths 13 16 | obtain_all_privilege stringclasses 3
values | obtain_user_privilege stringclasses 2
values | obtain_other_privilege stringclasses 2
values | user_interaction_required stringclasses 3
values | cvss2_vector_string stringclasses 106
values | cvss2_access_vector stringclasses 4
values | cvss2_access_complexity stringclasses 4
values | cvss2_authentication stringclasses 3
values | cvss2_confidentiality_impact stringclasses 4
values | cvss2_integrity_impact stringclasses 4
values | cvss2_availability_impact stringclasses 4
values | cvss2_base_score stringclasses 50
values | cvss3_vector_string stringclasses 226
values | cvss3_attack_vector stringclasses 5
values | cvss3_attack_complexity stringclasses 3
values | cvss3_privileges_required stringclasses 4
values | cvss3_user_interaction stringclasses 3
values | cvss3_scope stringclasses 3
values | cvss3_confidentiality_impact stringclasses 4
values | cvss3_integrity_impact stringclasses 4
values | cvss3_availability_impact stringclasses 4
values | cvss3_base_score stringclasses 55
values | cvss3_base_severity stringclasses 5
values | exploitability_score stringclasses 22
values | impact_score stringclasses 15
values | ac_insuf_info stringclasses 3
values | reference_json stringlengths 221 23.3k | problemtype_json stringclasses 200
values | severity stringclasses 4
values | cve_nodes stringlengths 2 33.1k | cve_description stringlengths 64 1.99k | cve_last_modified_date stringlengths 17 17 | cve_published_date stringlengths 17 17 | cwe_name stringclasses 125
values | cwe_description stringclasses 124
values | cwe_extended_description stringclasses 95
values | cwe_url stringclasses 124
values | cwe_is_category int64 0 1 | commit_author stringlengths 0 34 | commit_author_date stringlengths 25 25 | commit_msg stringlengths 0 13.3k | commit_hash stringlengths 40 40 | commit_is_merge stringclasses 1
value | repo_name stringclasses 467
values | repo_description stringclasses 459
values | repo_date_created stringclasses 467
values | repo_date_last_push stringclasses 467
values | repo_homepage stringclasses 294
values | repo_owner stringclasses 470
values | repo_stars stringclasses 406
values | repo_forks stringclasses 352
values | function_name stringlengths 3 120 | function_signature stringlengths 6 640 | function_parameters stringlengths 2 302 | function stringlengths 12 114k | function_token_count stringlengths 1 5 | function_before_change stringclasses 1
value | labels int64 1 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-1999-0199 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'name': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'refsource': 'MISC', 'tags': ['Product', 'Vendor Advisory']}, {'url': 'https://www.cee.studio/tdelete.html', 'name': 'https://www.cee.studio/tdelete.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third... | [{'description': [{'lang': 'en', 'value': 'CWE-252'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999... | 2020-12-03T16:52Z | 2020-10-06T13:15Z | Unchecked Return Value | The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions. | Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the software is not in a... | https://cwe.mitre.org/data/definitions/252.html | 0 | Ulrich Drepper | 1999-11-10 02:42:49+00:00 | Update.
1999-11-09 Ulrich Drepper <drepper@cygnus.com>
* elf/dl-load.c (_dl_dst_count): Allow $ORIGIN to point to
directory with the reference since this is as secure as using the
object with the dependency.
(_dl_dst_substitute): Likewise.
* elf/dl-load.c (_dl_dst_count): Change strings in first two
strncmp ... | 2864e767053317538feafa815046fff89e5a16be | False | bminor/glibc | Unofficial mirror of sourceware glibc repository. Updated daily. | 2013-10-25 18:26:45 | 2022-08-27 00:01:40 | https://sourceware.org/git/gitweb.cgi?p=glibc.git | bminor | 762.0 | 260.0 | _dl_dst_count | _dl_dst_count( const char * name , int is_path) | ['name', 'is_path'] | _dl_dst_count (const char *name, int is_path)
{
size_t cnt = 0;
do
{
size_t len = 1;
/* $ORIGIN is not expanded for SUID/GUID programs. */
if ((((!__libc_enable_secure
&& strncmp (&name[1], "ORIGIN", 6) == 0 && (len = 7) != 0)
|| (strncmp (&name[1], "PLATFORM", 8) == 0 && (len = ... | 199 | True | 1 |
CVE-1999-0199 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'name': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'refsource': 'MISC', 'tags': ['Product', 'Vendor Advisory']}, {'url': 'https://www.cee.studio/tdelete.html', 'name': 'https://www.cee.studio/tdelete.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third... | [{'description': [{'lang': 'en', 'value': 'CWE-252'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999... | 2020-12-03T16:52Z | 2020-10-06T13:15Z | Unchecked Return Value | The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions. | Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the software is not in a... | https://cwe.mitre.org/data/definitions/252.html | 0 | Ulrich Drepper | 1999-11-10 02:42:49+00:00 | Update.
1999-11-09 Ulrich Drepper <drepper@cygnus.com>
* elf/dl-load.c (_dl_dst_count): Allow $ORIGIN to point to
directory with the reference since this is as secure as using the
object with the dependency.
(_dl_dst_substitute): Likewise.
* elf/dl-load.c (_dl_dst_count): Change strings in first two
strncmp ... | 2864e767053317538feafa815046fff89e5a16be | False | bminor/glibc | Unofficial mirror of sourceware glibc repository. Updated daily. | 2013-10-25 18:26:45 | 2022-08-27 00:01:40 | https://sourceware.org/git/gitweb.cgi?p=glibc.git | bminor | 762.0 | 260.0 | _dl_dst_substitute | _dl_dst_substitute( struct link_map * l , const char * name , char * result , int is_path) | ['l', 'name', 'result', 'is_path'] | _dl_dst_substitute (struct link_map *l, const char *name, char *result,
int is_path)
{
char *last_elem, *wp;
/* Now fill the result path. While copying over the string we keep
track of the start of the last path element. When we come accross
a DST we copy over the value or (if the value is not av... | 349 | True | 1 |
CVE-1999-0199 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'name': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'refsource': 'MISC', 'tags': ['Product', 'Vendor Advisory']}, {'url': 'https://www.cee.studio/tdelete.html', 'name': 'https://www.cee.studio/tdelete.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third... | [{'description': [{'lang': 'en', 'value': 'CWE-252'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999... | 2020-12-03T16:52Z | 2020-10-06T13:15Z | Unchecked Return Value | The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions. | Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the software is not in a... | https://cwe.mitre.org/data/definitions/252.html | 0 | Ulrich Drepper | 1999-11-10 02:42:49+00:00 | Update.
1999-11-09 Ulrich Drepper <drepper@cygnus.com>
* elf/dl-load.c (_dl_dst_count): Allow $ORIGIN to point to
directory with the reference since this is as secure as using the
object with the dependency.
(_dl_dst_substitute): Likewise.
* elf/dl-load.c (_dl_dst_count): Change strings in first two
strncmp ... | 2864e767053317538feafa815046fff89e5a16be | False | bminor/glibc | Unofficial mirror of sourceware glibc repository. Updated daily. | 2013-10-25 18:26:45 | 2022-08-27 00:01:40 | https://sourceware.org/git/gitweb.cgi?p=glibc.git | bminor | 762.0 | 260.0 | expand_dynamic_string_token | expand_dynamic_string_token( struct link_map * l , const char * s) | ['l', 's'] | expand_dynamic_string_token (struct link_map *l, const char *s)
{
/* We make two runs over the string. First we determine how large the
resulting string is and then we copy it over. Since this is now
frequently executed operation we are looking here not for performance
but rather for code size. */
... | 95 | True | 1 |
CVE-1999-0199 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'name': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'refsource': 'MISC', 'tags': ['Product', 'Vendor Advisory']}, {'url': 'https://www.cee.studio/tdelete.html', 'name': 'https://www.cee.studio/tdelete.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third... | [{'description': [{'lang': 'en', 'value': 'CWE-252'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999... | 2020-12-03T16:52Z | 2020-10-06T13:15Z | Unchecked Return Value | The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions. | Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the software is not in a... | https://cwe.mitre.org/data/definitions/252.html | 0 | Ulrich Drepper | 1999-11-10 02:42:49+00:00 | Update.
1999-11-09 Ulrich Drepper <drepper@cygnus.com>
* elf/dl-load.c (_dl_dst_count): Allow $ORIGIN to point to
directory with the reference since this is as secure as using the
object with the dependency.
(_dl_dst_substitute): Likewise.
* elf/dl-load.c (_dl_dst_count): Change strings in first two
strncmp ... | 2864e767053317538feafa815046fff89e5a16be | False | bminor/glibc | Unofficial mirror of sourceware glibc repository. Updated daily. | 2013-10-25 18:26:45 | 2022-08-27 00:01:40 | https://sourceware.org/git/gitweb.cgi?p=glibc.git | bminor | 762.0 | 260.0 | vsyslog | vsyslog( pri , fmt , ap) | ['pri', 'fmt', 'ap'] | vsyslog(pri, fmt, ap)
int pri;
register const char *fmt;
va_list ap;
{
struct tm now_tm;
time_t now;
int fd;
FILE *f;
char *buf = 0;
size_t bufsize = 0;
size_t prioff, msgoff;
struct sigaction action, oldaction;
struct sigaction *oldaction_ptr = NULL;
int sigpipe;
int saved_errno = errno;
#define INTER... | 582 | True | 1 |
CVE-1999-0199 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'name': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'refsource': 'MISC', 'tags': ['Product', 'Vendor Advisory']}, {'url': 'https://www.cee.studio/tdelete.html', 'name': 'https://www.cee.studio/tdelete.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third... | [{'description': [{'lang': 'en', 'value': 'CWE-252'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999... | 2020-12-03T16:52Z | 2020-10-06T13:15Z | Unchecked Return Value | The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions. | Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the software is not in a... | https://cwe.mitre.org/data/definitions/252.html | 0 | Ulrich Drepper | 1999-11-10 02:42:49+00:00 | Update.
1999-11-09 Ulrich Drepper <drepper@cygnus.com>
* elf/dl-load.c (_dl_dst_count): Allow $ORIGIN to point to
directory with the reference since this is as secure as using the
object with the dependency.
(_dl_dst_substitute): Likewise.
* elf/dl-load.c (_dl_dst_count): Change strings in first two
strncmp ... | 2864e767053317538feafa815046fff89e5a16be | False | bminor/glibc | Unofficial mirror of sourceware glibc repository. Updated daily. | 2013-10-25 18:26:45 | 2022-08-27 00:01:40 | https://sourceware.org/git/gitweb.cgi?p=glibc.git | bminor | 762.0 | 260.0 | init_syntax_once | init_syntax_once() | [] | init_syntax_once ()
{
register int c;
static int done;
if (done)
return;
bzero (re_syntax_table, sizeof re_syntax_table);
for (c = 'a'; c <= 'z'; c++)
re_syntax_table[c] = Sword;
for (c = 'A'; c <= 'Z'; c++)
re_syntax_table[c] = Sword;
for (c = '0'; c <= '9'; c++)
re_syntax... | 98 | True | 1 |
CVE-1999-0199 | False | False | False | False | AV:N/AC:L/Au:N/C:P/I:P/A:P | NETWORK | LOW | NONE | PARTIAL | PARTIAL | PARTIAL | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | NETWORK | LOW | NONE | NONE | UNCHANGED | HIGH | HIGH | HIGH | 9.8 | CRITICAL | 3.9 | 5.9 | False | [{'url': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'name': 'https://ftp.gnu.org/gnu/glibc/glibc-2.2.tar.gz', 'refsource': 'MISC', 'tags': ['Product', 'Vendor Advisory']}, {'url': 'https://www.cee.studio/tdelete.html', 'name': 'https://www.cee.studio/tdelete.html', 'refsource': 'MISC', 'tags': ['Exploit', 'Third... | [{'description': [{'lang': 'en', 'value': 'CWE-252'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*', 'versionEndExcluding': '2.2', 'cpe_name': []}]}] | [{'lang': 'en', 'value': "manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999... | 2020-12-03T16:52Z | 2020-10-06T13:15Z | Unchecked Return Value | The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions. | Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the software is not in a... | https://cwe.mitre.org/data/definitions/252.html | 0 | Ulrich Drepper | 1999-11-10 02:42:49+00:00 | Update.
1999-11-09 Ulrich Drepper <drepper@cygnus.com>
* elf/dl-load.c (_dl_dst_count): Allow $ORIGIN to point to
directory with the reference since this is as secure as using the
object with the dependency.
(_dl_dst_substitute): Likewise.
* elf/dl-load.c (_dl_dst_count): Change strings in first two
strncmp ... | 2864e767053317538feafa815046fff89e5a16be | False | bminor/glibc | Unofficial mirror of sourceware glibc repository. Updated daily. | 2013-10-25 18:26:45 | 2022-08-27 00:01:40 | https://sourceware.org/git/gitweb.cgi?p=glibc.git | bminor | 762.0 | 260.0 | getlogin_r | getlogin_r( name , name_len) | ['name', 'name_len'] | getlogin_r (name, name_len)
char *name;
size_t name_len;
{
char tty_pathname[2 + 2 * NAME_MAX];
char *real_tty_path = tty_pathname;
int result = 0;
struct utmp *ut, line, buffer;
{
int d = __open ("/dev/tty", 0);
if (d < 0)
return errno;
result = __ttyname_r (d, real_tty_path, si... | 216 | True | 1 |
CVE-2012-1013 | False | False | False | False | AV:N/AC:L/Au:S/C:N/I:N/A:P | NETWORK | LOW | SINGLE | NONE | NONE | PARTIAL | 4.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7152', 'name': 'http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&pass=guest&id=7152', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://web.mit.edu/kerberos/krb5-1.10/', 'name': 'http://web.mit.edu/kerberos/krb5-1.10/', 'refsource... | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*... | [{'lang': 'en', 'value': 'The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX creat... | 2020-01-21T15:46Z | 2012-06-07T19:55Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Richard Basch | 2012-05-29 14:07:03-04:00 | Null pointer deref in kadmind [CVE-2012-1013]
The fix for #6626 could cause kadmind to dereference a null pointer if
a create-principal request contains no password but does contain the
KRB5_KDB_DISALLOW_ALL_TIX flag (e.g. "addprinc -randkey -allow_tix
name"). Only clients authorized to create principals can trigger ... | c5be6209311d4a8f10fda37d0d3f876c1b33b77b | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | check_1_6_dummy | check_1_6_dummy( kadm5_principal_ent_t entry , long mask , int n_ks_tuple , krb5_key_salt_tuple * ks_tuple , char ** passptr) | ['entry', 'mask', 'n_ks_tuple', 'ks_tuple', 'passptr'] | check_1_6_dummy(kadm5_principal_ent_t entry, long mask,
int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, char **passptr)
{
int i;
char *password = *passptr;
/* Old-style randkey operations disallowed tickets to start. */
if (!(mask & KADM5_ATTRIBUTES) ||
!(entry->attributes & KRB5... | 94 | True | 1 |
CVE-2002-2443 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:P | NETWORK | LOW | NONE | NONE | NONE | PARTIAL | 5.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=962531', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=962531', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c', 'name': 'https://github.com/kr... | [{'description': [{'lang': 'en', 'value': 'CWE-20'}]}] | MEDIUM | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.11.3', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*', 'cpe_name... | [{'lang': 'en', 'value': 'schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loo... | 2021-02-02T18:44Z | 2013-05-29T14:29Z | Improper Input Validation | The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. |
Input validation is a frequently-used technique
for checking potentially dangerous inputs in order to
ensure that the inputs are safe for processing within the
code, or when communicating with other components. When
software does not validate input properly, an attacker is
able to craft the in... | https://cwe.mitre.org/data/definitions/20.html | 0 | Tom Yu | 2013-05-03 16:26:46-04:00 | Fix kpasswd UDP ping-pong [CVE-2002-2443]
The kpasswd service provided by kadmind was vulnerable to a UDP
"ping-pong" attack [CVE-2002-2443]. Don't respond to packets unless
they pass some basic validation, and don't respond to our own error
packets.
Some authors use CVE-1999-0103 to refer to the kpasswd UDP ping-po... | cf1a0c411b2668c57c41e9c4efd15ba17b6b322c | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | process_chpw_request | process_chpw_request( krb5_context context , void * server_handle , char * realm , krb5_keytab keytab , const krb5_fulladdr * local_faddr , const krb5_fulladdr * remote_faddr , krb5_data * req , krb5_data * rep) | ['context', 'server_handle', 'realm', 'keytab', 'local_faddr', 'remote_faddr', 'req', 'rep'] | process_chpw_request(krb5_context context, void *server_handle, char *realm,
krb5_keytab keytab, const krb5_fulladdr *local_faddr,
const krb5_fulladdr *remote_faddr, krb5_data *req,
krb5_data *rep)
{
krb5_error_code ret;
char *ptr;
unsigned int ... | 1935 | True | 1 |
CVE-2014-4343 | False | False | False | False | AV:N/AC:H/Au:N/C:C/I:C/A:C | NETWORK | HIGH | NONE | COMPLETE | COMPLETE | COMPLETE | 7.6 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969', 'name': 'http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969', 'refsource': 'CONFIRM', 'tags': ['Issue Tracking', 'Third Party Advisory']}, {'url': 'https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f', 'name': 'https://github.co... | [{'description': [{'lang': 'en', 'value': 'CWE-415'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, ... | [{'lang': 'en', 'value': 'Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code vi... | 2020-01-21T15:46Z | 2014-08-14T05:01Z | Double Free | The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations. | When a program calls free() twice with the same argument, the program's memory management data structures become corrupted. This corruption can cause the program to crash or, in some circumstances, cause two later calls to malloc() to return the same pointer. If malloc() returns the same value twice and the program lat... | https://cwe.mitre.org/data/definitions/415.html | 0 | David Woodhouse | 2014-07-15 12:54:15-04:00 | Fix double-free in SPNEGO [CVE-2014-4343]
In commit cd7d6b08 ("Verify acceptor's mech in SPNEGO initiator") the
pointer sc->internal_mech became an alias into sc->mech_set->elements,
which should be considered constant for the duration of the SPNEGO
context. So don't free it.
CVE-2014-4343:
In MIT krb5 releases 1.1... | f18ddf5d82de0ab7591a36e465bc24225776940f | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | init_ctx_reselect | init_ctx_reselect( OM_uint32 * minor_status , spnego_gss_ctx_id_t sc , OM_uint32 acc_negState , gss_OID supportedMech , gss_buffer_t * responseToken , gss_buffer_t * mechListMIC , OM_uint32 * negState , send_token_flag * tokflag) | ['minor_status', 'sc', 'acc_negState', 'supportedMech', 'responseToken', 'mechListMIC', 'negState', 'tokflag'] | init_ctx_reselect(OM_uint32 *minor_status, spnego_gss_ctx_id_t sc,
OM_uint32 acc_negState, gss_OID supportedMech,
gss_buffer_t *responseToken, gss_buffer_t *mechListMIC,
OM_uint32 *negState, send_token_flag *tokflag)
{
OM_uint32 tmpmin;
size_t i;
generic_gss_release_oid(&tmpmin, &sc->internal_mech);
gs... | 162 | True | 1 |
CVE-2014-4344 | False | False | False | False | AV:N/AC:L/Au:N/C:N/I:N/A:C | NETWORK | LOW | NONE | NONE | NONE | COMPLETE | 7.8 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc', 'name': 'https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Issue Tracking', 'Third Party Advisory']}, {'url': 'http://krbdev.mit.edu/rt/Ticket/Display.html?id=... | [{'description': [{'lang': 'en', 'value': 'CWE-476'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*', 'cpe_name': []}, {'vul... | [{'lang': 'en', 'value': 'The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain... | 2020-01-21T15:46Z | 2014-08-14T05:01Z | NULL Pointer Dereference | A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. | NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
| https://cwe.mitre.org/data/definitions/476.html | 0 | Greg Hudson | 2014-07-15 12:56:01-04:00 | Fix null deref in SPNEGO acceptor [CVE-2014-4344]
When processing a continuation token, acc_ctx_cont was dereferencing
the initial byte of the token without checking the length. This could
result in a null dereference.
CVE-2014-4344:
In MIT krb5 1.5 and newer, an unauthenticated or partially
authenticated remote at... | 524688ce87a15fc75f87efc8c039ba4c7d5c197b | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | acc_ctx_cont | acc_ctx_cont( OM_uint32 * minstat , gss_buffer_t buf , gss_ctx_id_t * ctx , gss_buffer_t * responseToken , gss_buffer_t * mechListMIC , OM_uint32 * negState , send_token_flag * return_token) | ['minstat', 'buf', 'ctx', 'responseToken', 'mechListMIC', 'negState', 'return_token'] | acc_ctx_cont(OM_uint32 *minstat,
gss_buffer_t buf,
gss_ctx_id_t *ctx,
gss_buffer_t *responseToken,
gss_buffer_t *mechListMIC,
OM_uint32 *negState,
send_token_flag *return_token)
{
OM_uint32 ret, tmpmin;
gss_OID supportedMech;
spnego_gss_ctx_id_t sc;
unsigned int len;
unsigned ch... | 269 | True | 1 |
CVE-2014-5351 | False | False | False | False | AV:N/AC:H/Au:S/C:P/I:N/A:N | NETWORK | HIGH | SINGLE | PARTIAL | NONE | NONE | 2.1 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca', 'name': 'https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018', 'name': 'http://krbdev.mit.edu/rt/Ticket/D... | [{'description': [{'lang': 'en', 'value': 'CWE-255'}]}] | LOW | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*', 'cpe_name': []}]}] | [{'lang': 'en', 'value': 'The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.'}] | 2020-01-21T15:46Z | 2014-10-10T01:55Z | Credentials Management Errors | Weaknesses in this category are related to the management of credentials. | https://cwe.mitre.org/data/definitions/255.html | 1 | Greg Hudson | 2014-08-21 13:52:07-04:00 | Return only new keys in randkey [CVE-2014-5351]
In kadmind's randkey operation, if a client specifies the keepold
flag, do not include the preserved old keys in the response.
CVE-2014-5351:
An authenticated remote attacker can retrieve the current keys for a
service principal when generating a new set of keys for th... | af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | kadm5_randkey_principal_3 | kadm5_randkey_principal_3( void * server_handle , krb5_principal principal , krb5_boolean keepold , int n_ks_tuple , krb5_key_salt_tuple * ks_tuple , krb5_keyblock ** keyblocks , int * n_keys) | ['server_handle', 'principal', 'keepold', 'n_ks_tuple', 'ks_tuple', 'keyblocks', 'n_keys'] | kadm5_randkey_principal_3(void *server_handle,
krb5_principal principal,
krb5_boolean keepold,
int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
krb5_keyblock **keyblocks,
int *n_keys)
{
kr... | 583 | True | 1 | |
CVE-2014-5353 | False | False | False | False | AV:N/AC:M/Au:S/C:N/I:N/A:P | NETWORK | MEDIUM | SINGLE | NONE | NONE | PARTIAL | 3.5 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | False | [{'url': 'https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3', 'name': 'https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3', 'refsource': 'CONFIRM', 'tags': ['Patch', 'Third Party Advisory']}, {'url': 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:009', ... | [{'description': [{'lang': 'en', 'value': 'CWE-476'}]}] | LOW | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*', 'versionEndExcluding': '1.13.1', 'cpe_name': []}]}, {'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*... | [{'lang': 'en', 'value': 'The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as... | 2021-02-02T18:57Z | 2014-12-16T23:59Z | NULL Pointer Dereference | A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. | NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
| https://cwe.mitre.org/data/definitions/476.html | 0 | Greg Hudson | 2014-12-05 14:01:39-05:00 | Fix LDAP misused policy name crash [CVE-2014-5353]
In krb5_ldap_get_password_policy_from_dn, if LDAP_SEARCH returns
successfully with no results, return KRB5_KDB_NOENTRY instead of
returning success with a zeroed-out policy object. This fixes a null
dereference when an admin attempts to use an LDAP ticket policy name... | d1f707024f1d0af6e54a18885322d70fa15ec4d3 | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | krb5_ldap_get_password_policy_from_dn | krb5_ldap_get_password_policy_from_dn( krb5_context context , char * pol_name , char * pol_dn , osa_policy_ent_t * policy) | ['context', 'pol_name', 'pol_dn', 'policy'] | krb5_ldap_get_password_policy_from_dn(krb5_context context, char *pol_name,
char *pol_dn, osa_policy_ent_t *policy)
{
krb5_error_code st=0, tempst=0;
LDAP *ld=NULL;
LDAPMessage *result=NULL,*ent=NULL;
kdb5_dal_handl... | 235 | True | 1 |
CVE-2014-5354 | False | False | False | False | AV:N/AC:M/Au:S/C:N/I:N/A:P | NETWORK | MEDIUM | SINGLE | NONE | NONE | PARTIAL | 3.5 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16', 'name': 'https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/71680', 'name': '71680', 'refsource': 'BID', 'tags': []}, {'url'... | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | LOW | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:... | [{'lang': 'en', 'value': 'plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, ... | 2020-01-21T15:46Z | 2014-12-16T23:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Ben Kaduk | 2014-11-19 12:04:46-05:00 | Support keyless principals in LDAP [CVE-2014-5354]
Operations like "kadmin -q 'addprinc -nokey foo'" or
"kadmin -q 'purgekeys -all foo'" result in principal entries with
no keys present, so krb5_encode_krbsecretkey() would just return
NULL, which then got unconditionally dereferenced in
krb5_add_ber_mem_ldap_mod().
A... | 04038bf3633c4b909b5ded3072dc88c8c419bf16 | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | krb5_encode_krbsecretkey | krb5_encode_krbsecretkey( krb5_key_data * key_data_in , int n_key_data , krb5_kvno mkvno) | ['key_data_in', 'n_key_data', 'mkvno'] | krb5_encode_krbsecretkey(krb5_key_data *key_data_in, int n_key_data,
krb5_kvno mkvno) {
struct berval **ret = NULL;
int currkvno;
int num_versions = 1;
int i, j, last;
krb5_error_code err = 0;
krb5_key_data *key_data;
if (n_key_data <= 0)
return NULL;
/... | 482 | True | 1 |
CVE-2014-5354 | False | False | False | False | AV:N/AC:M/Au:S/C:N/I:N/A:P | NETWORK | MEDIUM | SINGLE | NONE | NONE | PARTIAL | 3.5 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16', 'name': 'https://github.com/krb5/krb5/commit/04038bf3633c4b909b5ded3072dc88c8c419bf16', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://www.securityfocus.com/bid/71680', 'name': '71680', 'refsource': 'BID', 'tags': []}, {'url'... | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | LOW | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos:5_1.13:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:... | [{'lang': 'en', 'value': 'plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, ... | 2020-01-21T15:46Z | 2014-12-16T23:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Ben Kaduk | 2014-11-19 12:04:46-05:00 | Support keyless principals in LDAP [CVE-2014-5354]
Operations like "kadmin -q 'addprinc -nokey foo'" or
"kadmin -q 'purgekeys -all foo'" result in principal entries with
no keys present, so krb5_encode_krbsecretkey() would just return
NULL, which then got unconditionally dereferenced in
krb5_add_ber_mem_ldap_mod().
A... | 04038bf3633c4b909b5ded3072dc88c8c419bf16 | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | krb5_ldap_put_principal | krb5_ldap_put_principal( krb5_context context , krb5_db_entry * entry , char ** db_args) | ['context', 'entry', 'db_args'] | krb5_ldap_put_principal(krb5_context context, krb5_db_entry *entry,
char **db_args)
{
int l=0, kerberos_principal_object_type=0;
unsigned int ntrees=0, tre=0;
krb5_error_code st=0, tempst=0;
LDAP *ld=NULL;
... | 4100 | True | 1 |
CVE-2014-5352 | False | False | False | False | AV:N/AC:L/Au:S/C:C/I:C/A:C | NETWORK | LOW | SINGLE | COMPLETE | COMPLETE | COMPLETE | 9.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt', 'name': 'http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt', 'name': 'http://web.mit.edu/kerberos/advisories/2015-001-pat... | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:... | [{'lang': 'en', 'value': 'The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticat... | 2020-01-21T15:46Z | 2015-02-19T11:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Greg Hudson | 2014-11-05 11:58:04-05:00 | Fix gss_process_context_token() [CVE-2014-5352]
[MITKRB5-SA-2015-001] The krb5 gss_process_context_token() should not
actually delete the context; that leaves the caller with a dangling
pointer and no way to know that it is invalid. Instead, mark the
context as terminated, and check for terminated contexts in the GSS... | 82dc33da50338ac84c7b4102dc6513d897d0506a | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | krb5_gss_context_time | krb5_gss_context_time( minor_status , context_handle , time_rec) | ['minor_status', 'context_handle', 'time_rec'] | krb5_gss_context_time(minor_status, context_handle, time_rec)
OM_uint32 *minor_status;
gss_ctx_id_t context_handle;
OM_uint32 *time_rec;
{
krb5_error_code code;
krb5_gss_ctx_id_rec *ctx;
krb5_timestamp now;
krb5_deltat lifetime;
ctx = (krb5_gss_ctx_id_rec *) context_handle;
if (! c... | 150 | True | 1 |
CVE-2014-5352 | False | False | False | False | AV:N/AC:L/Au:S/C:C/I:C/A:C | NETWORK | LOW | SINGLE | COMPLETE | COMPLETE | COMPLETE | 9.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt', 'name': 'http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt', 'name': 'http://web.mit.edu/kerberos/advisories/2015-001-pat... | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:... | [{'lang': 'en', 'value': 'The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticat... | 2020-01-21T15:46Z | 2015-02-19T11:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Greg Hudson | 2014-11-05 11:58:04-05:00 | Fix gss_process_context_token() [CVE-2014-5352]
[MITKRB5-SA-2015-001] The krb5 gss_process_context_token() should not
actually delete the context; that leaves the caller with a dangling
pointer and no way to know that it is invalid. Instead, mark the
context as terminated, and check for terminated contexts in the GSS... | 82dc33da50338ac84c7b4102dc6513d897d0506a | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | krb5_gss_inquire_sec_context_by_oid | krb5_gss_inquire_sec_context_by_oid( OM_uint32 * minor_status , const gss_ctx_id_t context_handle , const gss_OID desired_object , gss_buffer_set_t * data_set) | ['minor_status', 'context_handle', 'desired_object', 'data_set'] | krb5_gss_inquire_sec_context_by_oid (OM_uint32 *minor_status,
const gss_ctx_id_t context_handle,
const gss_OID desired_object,
gss_buffer_set_t *data_set)
{
krb5_gss_ctx_id_rec *ctx;
size_t i;
if ... | 153 | True | 1 |
CVE-2014-5352 | False | False | False | False | AV:N/AC:L/Au:S/C:C/I:C/A:C | NETWORK | LOW | SINGLE | COMPLETE | COMPLETE | COMPLETE | 9.0 | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | nan | [{'url': 'http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt', 'name': 'http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt', 'refsource': 'CONFIRM', 'tags': []}, {'url': 'http://web.mit.edu/kerberos/advisories/2015-001-patch-r113.txt', 'name': 'http://web.mit.edu/kerberos/advisories/2015-001-pat... | [{'description': [{'lang': 'en', 'value': 'NVD-CWE-Other'}]}] | HIGH | [{'operator': 'OR', 'children': [], 'cpe_match': [{'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*', 'cpe_name': []}, {'vulnerable': True, 'cpe23Uri': 'cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:... | [{'lang': 'en', 'value': 'The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticat... | 2020-01-21T15:46Z | 2015-02-19T11:59Z | Other | NVD is only using a subset of CWE for mapping instead of the entire CWE, and the weakness type is not covered by that subset. | Insufficient Information | https://nvd.nist.gov/vuln/categories | 0 | Greg Hudson | 2014-11-05 11:58:04-05:00 | Fix gss_process_context_token() [CVE-2014-5352]
[MITKRB5-SA-2015-001] The krb5 gss_process_context_token() should not
actually delete the context; that leaves the caller with a dangling
pointer and no way to know that it is invalid. Instead, mark the
context as terminated, and check for terminated contexts in the GSS... | 82dc33da50338ac84c7b4102dc6513d897d0506a | False | krb5/krb5 | mirror of MIT krb5 repository | 2012-05-12 16:01:32 | 2022-08-18 23:14:09 | null | krb5 | 414.0 | 324.0 | krb5_gss_inquire_context | krb5_gss_inquire_context( minor_status , context_handle , initiator_name , acceptor_name , lifetime_rec , mech_type , ret_flags , locally_initiated , opened) | ['minor_status', 'context_handle', 'initiator_name', 'acceptor_name', 'lifetime_rec', 'mech_type', 'ret_flags', 'locally_initiated', 'opened'] | krb5_gss_inquire_context(minor_status, context_handle, initiator_name,
acceptor_name, lifetime_rec, mech_type, ret_flags,
locally_initiated, opened)
OM_uint32 *minor_status;
gss_ctx_id_t context_handle;
gss_name_t *initiator_name;
gss_name_t *acceptor_na... | 411 | True | 1 |
End of preview. Expand in Data Studio
vulnerable-functions-and-commits_cvefixes-2022
Contains vulnerable functions and commits from the CVEFixes SQLite database.
- Downloads last month
- 36