Page 10 of 55 results (0.008 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

GSSFTP FTP daemon in Kerberos 5 1.1.x does not properly restrict access to some FTP commands, which allows remote attackers to cause a denial of service, and local users to gain root privileges. • http://web.mit.edu/kerberos/www/advisories/ftp.txt http://www.osvdb.org/4885 http://www.securityfocus.com/bid/1374 http://www.securityfocus.com/templates/archive.pike?list=1&msg=ldvsnufao18.fsf%40saint-elmos-fire.mit.edu https://exchange.xforce.ibmcloud.com/vulnerabilities/4734 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the e_msg variable in the kerb_err_reply function. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.osvdb.org/4875 http://www.redhat.com/support/errata/RHSA-2000-031.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the localrealm variable in the process_v4 function. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.securityfocus.com/bid/1338 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.0EPSS: 2%CPEs: 6EXPL: 0

Kerberos 4 KDC program improperly frees memory twice (aka "double-free"), which allows remote attackers to cause a denial of service. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.redhat.com/support/errata/RHSA-2000-031.html http://www.securityfocus.com/bid/1465 •

CVSS: 5.0EPSS: 1%CPEs: 6EXPL: 1

Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote attackers to cause a denial of service via a malformed request. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.redhat.com/support/errata/RHSA-2000-031.html •