8 results (0.006 seconds)

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

Heap overflow in the KTH Kerberos 4 FTP client 4-1.1.1 allows remote malicious servers to execute arbitrary code on the client via a long response to a passive (PASV) mode request. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0339.html http://www.iss.net/security_center/static/8938.php http://www.securityfocus.com/bid/4592 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

KTH Kerberos IV and Kerberos V (Heimdal) for Telnet clients do not encrypt connections if the server does not support the requested encryption, which allows remote attackers to read communications via a man-in-the-middle attack. • http://josefsson.org/ktelnet/kerberos-telnet.html http://www.kb.cert.org/vuls/id/390280 https://exchange.xforce.ibmcloud.com/vulnerabilities/10640 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to downgrade authentication and encryption mechanisms via a man-in-the-middle attack. • http://josefsson.org/ktelnet/kerberos-telnet.html http://www.kb.cert.org/vuls/id/774587 https://exchange.xforce.ibmcloud.com/vulnerabilities/10640 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges. • https://www.exploit-db.com/exploits/20491 http://archives.neohapsis.com/archives/bugtraq/2000-12/0093.html http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5733 •

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 1

KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file. • http://archives.neohapsis.com/archives/bugtraq/2000-12/0093.html http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html http://www.redhat.com/support/errata/RHSA-2001-025.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5754 •