Lucene search

K
KthKth Kerberos

5 matches found

CVE
CVE
added 2001/05/07 4:0 a.m.43 views

CVE-2001-0034

KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges.

7.2CVSS7AI score0.00375EPSS
CVE
CVE
added 2002/06/18 4:0 a.m.39 views

CVE-2002-0600

Heap overflow in the KTH Kerberos 4 FTP client 4-1.1.1 allows remote malicious servers to execute arbitrary code on the client via a long response to a passive (PASV) mode request.

7.5CVSS8.2AI score0.01673EPSS
CVE
CVE
added 2005/04/21 4:0 a.m.38 views

CVE-2001-1444

The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to downgrade authentication and encryption mechanisms via a man-in-the-middle attack.

7.5CVSS7.2AI score0.00679EPSS
CVE
CVE
added 2001/05/07 4:0 a.m.34 views

CVE-2001-0035

Buffer overflow in the kdc_reply_cipher function in KTH Kerberos IV allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long authentication request.

7.2CVSS8.4AI score0.00847EPSS
CVE
CVE
added 2001/05/07 4:0 a.m.32 views

CVE-2001-0033

KTH Kerberos IV allows local users to change the configuration of a Kerberos server running at an elevated privilege by specifying an alternate directory using with the KRBCONFDIR environmental variable, which allows the user to gain additional privileges.

7.2CVSS7AI score0.0005EPSS