Kth Kerberos
Sign in to watchby Kth
CVEs (8)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2001-0034 | 0.03 | — | 0.01 | Feb 16, 2001 | KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges. | ||
| CVE-2002-0600 | 0.00 | — | 0.02 | Jun 18, 2002 | Heap overflow in the KTH Kerberos 4 FTP client 4-1.1.1 allows remote malicious servers to execute arbitrary code on the client via a long response to a passive (PASV) mode request. | ||
| CVE-2001-1443 | 0.00 | — | 0.01 | Aug 27, 2001 | KTH Kerberos IV and Kerberos V (Heimdal) for Telnet clients do not encrypt connections if the server does not support the requested encryption, which allows remote attackers to read communications via a man-in-the-middle attack. | ||
| CVE-2001-1444 | 0.00 | — | 0.01 | Aug 27, 2001 | The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to downgrade authentication and encryption mechanisms via a man-in-the-middle attack. | ||
| CVE-2001-0035 | 0.00 | — | 0.01 | Feb 16, 2001 | Buffer overflow in the kdc_reply_cipher function in KTH Kerberos IV allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long authentication request. | ||
| CVE-2001-0033 | 0.00 | — | 0.00 | Feb 16, 2001 | KTH Kerberos IV allows local users to change the configuration of a Kerberos server running at an elevated privilege by specifying an alternate directory using with the KRBCONFDIR environmental variable, which allows the user to gain additional privileges. | ||
| CVE-2001-0036 | 0.00 | — | 0.00 | Feb 16, 2001 | KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file. | ||
| CVE-1999-1099 | 0.00 | — | 0.01 | Nov 22, 1996 | Kerberos 4 allows remote attackers to obtain sensitive information via a malformed UDP packet that generates an error string that inadvertently includes the realm name and the last user. |