FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  371321
Date:      2014-10-21
Time:      13:58:33Z
Committer: madpilot

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
e3f64457-cccd-11e2-af76-206a8a720317krb5 -- UDP ping-pong vulnerability in the kpasswd (password changing) service. [CVE-2002-2443]

No advisory has been released yet.

schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103. [CVE-2002-2443].


Discovery 2013-05-10
Entry 2013-06-03
krb5
le 1.11.2

CVE-2002-2443
http://web.mit.edu/kerberos/www/krb5-1.11/
a30573dc-4893-11df-a5f9-001641aeabdfkrb5 -- remote denial of service vulnerability

An authenticated remote attacker can causing a denial of service by using a newer version of the kadmin protocol than the server supports.

The MIT Kerberos team also reports the cause:

The Kerberos administration daemon (kadmind) can crash due to referencing freed memory.


Discovery 2010-04-06
Entry 2010-04-18
krb5
le 1.6.3_9

39247
CVE-2010-0629
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-003.txt
f54584bc-7d2b-11e2-9bd1-206a8a720317krb5 -- null pointer dereference in the KDC PKINIT code [CVE-2013-1415]

No advisory has been released yet.

Fix a null pointer dereference in the KDC PKINIT code [CVE-2013-1415].


Discovery 2013-02-21
Entry 2013-02-22
krb5
le 1.11

CVE-2013-1415
http://web.mit.edu/kerberos/www/krb5-1.11/
11bbccbc-03ee-11e0-bcdb-001fc61c2a55krb5 -- multiple checksum handling vulnerabilities

The MIT Kerberos team reports:

MIT krb5 clients incorrectly accept an unkeyed checksums in the SAM-2 preauthentication challenge.

An unauthenticated remote attacker could alter a SAM-2 challenge, affecting the prompt text seen by the user or the kind of response sent to the KDC. Under some circumstances, this can negate the incremental security benefit of using a single-use authentication mechanism token.

MIT krb5 incorrectly accepts RFC 3961 key-derivation checksums using RC4 keys when verifying KRB-SAFE messages.

An unauthenticated remote attacker has a 1/256 chance of forging KRB-SAFE messages in an application protocol if the targeted pre-existing session uses an RC4 session key. Few application protocols use KRB-SAFE messages.


Discovery 2010-11-30
Entry 2010-12-09
krb5
ge 1.3.0 lt 1.7.2

ge 1.8.0 le 1.8.3

45118
CVE-2010-1323
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
http://osvdb.org/69610
a30573dc-4893-11df-a5f9-001641aeabdfkrb5 -- remote denial of service vulnerability

An authenticated remote attacker can causing a denial of service by using a newer version of the kadmin protocol than the server supports.

The MIT Kerberos team also reports the cause:

The Kerberos administration daemon (kadmind) can crash due to referencing freed memory.


Discovery 2010-04-06
Entry 2010-04-18
krb5
le 1.6.3_9

39247
CVE-2010-0629
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-003.txt
11bbccbc-03ee-11e0-bcdb-001fc61c2a55krb5 -- multiple checksum handling vulnerabilities

The MIT Kerberos team reports:

MIT krb5 clients incorrectly accept an unkeyed checksums in the SAM-2 preauthentication challenge.

An unauthenticated remote attacker could alter a SAM-2 challenge, affecting the prompt text seen by the user or the kind of response sent to the KDC. Under some circumstances, this can negate the incremental security benefit of using a single-use authentication mechanism token.

MIT krb5 incorrectly accepts RFC 3961 key-derivation checksums using RC4 keys when verifying KRB-SAFE messages.

An unauthenticated remote attacker has a 1/256 chance of forging KRB-SAFE messages in an application protocol if the targeted pre-existing session uses an RC4 session key. Few application protocols use KRB-SAFE messages.


Discovery 2010-11-30
Entry 2010-12-09
krb5
ge 1.3.0 lt 1.7.2

ge 1.8.0 le 1.8.3

45118
CVE-2010-1323
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-007.txt
http://osvdb.org/69610