Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

21 – 23 of 23 results


CVE-2005-2040

Unknown priority
Not affected

Multiple buffer overflows in the getterminaltype function in telnetd for Heimdal before 0.6.5 may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2005-0468 and CVE-2005-0469.

1 affected packages

heimdal

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
heimdal
Show less packages

CVE-2005-0469

Unknown priority
Fixed

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

5 affected packages

heimdal, krb4, krb5, netkit-telnet, netkit-telnet-ssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
heimdal
krb4
krb5
netkit-telnet
netkit-telnet-ssl
Show less packages

CVE-2004-0884

Unknown priority
Fixed

The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the...

3 affected packages

cyrus-sasl2, cyrus-sasl2-heimdal, cyrus-sasl2-mit

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
cyrus-sasl2
cyrus-sasl2-heimdal
cyrus-sasl2-mit
Show less packages