The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc)...
Moderate severity
Unreviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Mar 14, 2026
Description
Published by the National Vulnerability Database
Mar 19, 2008
Published to the GitHub Advisory Database
May 1, 2022
Last updated
Mar 14, 2026
The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unused portion of a buffer when generating an error message, which might allow remote attackers to obtain sensitive information, aka "Uninitialized stack values."
References