CVE-2002-1235
https://notcve.org/view.php?id=CVE-2002-1235
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack. La función kadm_ser en el demonio de administración de compatibildad de Kerberos v4 (kadmind4) en el MIT Kerberos 5 (krb5) krb5-1.2.6 y anteriores kadmind en KTH Kerberos 4 (eBones) anteriores a 1.2.1, y kadmind en KTH Kerberos 5 (Heimdal) anteriores a 0.5.1 compilados con soporte de Kerberos 4, no verifica adecuadamente la longitud de un campo de petición, lo que permite a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-026.txt.asc http://archives.neohapsis.com/archives/bugtraq/2002-10/0399.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000534 http://marc.info/?l=bugtraq&m=103539530729206&w=2 http://marc.info/?l=bugtraq&m=103564944215101&w=2 http://marc.info/?l=bugtraq&m=103582517126392&w=2 http://marc.info/? •
CVE-2002-0600
https://notcve.org/view.php?id=CVE-2002-0600
Heap overflow in the KTH Kerberos 4 FTP client 4-1.1.1 allows remote malicious servers to execute arbitrary code on the client via a long response to a passive (PASV) mode request. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0339.html http://www.iss.net/security_center/static/8938.php http://www.securityfocus.com/bid/4592 •
CVE-2001-1443
https://notcve.org/view.php?id=CVE-2001-1443
KTH Kerberos IV and Kerberos V (Heimdal) for Telnet clients do not encrypt connections if the server does not support the requested encryption, which allows remote attackers to read communications via a man-in-the-middle attack. • http://josefsson.org/ktelnet/kerberos-telnet.html http://www.kb.cert.org/vuls/id/390280 https://exchange.xforce.ibmcloud.com/vulnerabilities/10640 •
CVE-2001-1444
https://notcve.org/view.php?id=CVE-2001-1444
The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to downgrade authentication and encryption mechanisms via a man-in-the-middle attack. • http://josefsson.org/ktelnet/kerberos-telnet.html http://www.kb.cert.org/vuls/id/774587 https://exchange.xforce.ibmcloud.com/vulnerabilities/10640 •
CVE-2001-0034 – KTH Kerberos 4 - Arbitrary Proxy Usage
https://notcve.org/view.php?id=CVE-2001-0034
KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges. • https://www.exploit-db.com/exploits/20491 http://archives.neohapsis.com/archives/bugtraq/2000-12/0093.html http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5733 •