Lucene search

K
MitKerberos

6 matches found

CVE
CVE
added 2018/01/16 9:29 a.m.87 views

CVE-2018-5709

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to af...

7.5CVSS7.4AI score0.00463EPSS
CVE
CVE
added 2003/03/24 5:0 a.m.61 views

CVE-2003-0138

Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack.

7.5CVSS9.2AI score0.05644EPSS
CVE
CVE
added 2010/02/22 1:0 p.m.60 views

CVE-2010-0283

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.

7.8CVSS6.2AI score0.03492EPSS
CVE
CVE
added 2000/07/12 4:0 a.m.52 views

CVE-2000-0392

Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges.

7.2CVSS6.8AI score0.00114EPSS
CVE
CVE
added 2003/03/24 5:0 a.m.52 views

CVE-2003-0139

Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an attacker to create krb4 tickets for unauthorized principals using a cut-and-paste attack and "ticket splicing."

7.5CVSS9.2AI score0.04948EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.39 views

CVE-1999-1321

Buffer overflow in ssh 1.2.26 client with Kerberos V enabled could allow remote attackers to cause a denial of service or execute arbitrary commands via a long DNS hostname that is not properly handled during TGT ticket passing.

7.5CVSS8.6AI score0.00986EPSS