Page 12 of 60 results (0.052 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the lastrealm variable in the set_tgtkey function. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.securityfocus.com/bid/1338 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 10.0EPSS: 3%CPEs: 8EXPL: 3

Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/19924 https://www.exploit-db.com/exploits/19925 https://www.exploit-db.com/exploits/19926 http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 10.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4884 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 10.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4876 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •