6 results (0.003 seconds)

CVSS: 5.0EPSS: 1%CPEs: 6EXPL: 1

Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote attackers to cause a denial of service via a malformed request. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.redhat.com/support/errata/RHSA-2000-031.html •

CVSS: 5.0EPSS: 2%CPEs: 6EXPL: 0

Kerberos 4 KDC program improperly frees memory twice (aka "double-free"), which allows remote attackers to cause a denial of service. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.redhat.com/support/errata/RHSA-2000-031.html http://www.securityfocus.com/bid/1465 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 10.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4876 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 10.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4884 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •