Page 24 of 141 results (0.002 seconds)

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack. La versión 4 del protocolo Kerberos (kbr4) permite a un atacante impersonar a cualquier principal en un dominio (realm) mediante un ataque de texto plano elegido. • http://marc.info/?l=bugtraq&m=104791775804776&w=2 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt http://www.debian.org/security/2003/dsa-266 http://www.debian.org/security/2003/dsa-269 http://www.debian.org/security/2003/dsa-273 http://www.kb.cert.org/vuls/id/623217 http://www.redhat.com/support/errata/RHSA-2003-051.html http://www.redhat.com/support/errata/RHSA-2003-052.html http://www.redhat.com/support/errata/RHSA-2003-0 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an attacker to create krb4 tickets for unauthorized principals using a cut-and-paste attack and "ticket splicing." Ciertas debilidades en la implementación de la versión 4 del protocolo Kerberos (krb4) en la distribución krb5, cuando se usan claves triple-DES para serviciso clave krb4, permite a un atacante crear tiques para principales no autorizados usando un ataque de "cortar y pegar" y "empalme de tiques". • http://marc.info/?l=bugtraq&m=104791775804776&w=2 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt http://www.debian.org/security/2003/dsa-266 http://www.debian.org/security/2003/dsa-273 http://www.kb.cert.org/vuls/id/442569 http://www.redhat.com/support/errata/RHSA-2003-051.html http://www.redhat.com/support/errata/RHSA-2003-052.html http://www.redhat.com/support/errata/RHSA-2003-091.html http://www.securityfocus.com/archive/1&#x •

CVSS: 5.0EPSS: 2%CPEs: 8EXPL: 0

MIT Kerberos V5 Key Distribution Center (KDC) before 1.2.5 allows remote authenticated attackers to cause a denial of service (crash) on KDCs within the same realm via a certain protocol request that causes a null dereference. MIT Kerberos V5 Key Distribution Center (KDC) anteriores a 1.2.5 permite a atacantes autenticados remotamente causar una denegación de servicio (caída) en KDCs en el mismo dominio mediante una cierta petición de protocolo que causa una desreferencia nula. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000639 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/50142 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-001-multiple.txt http://www.kb.cert.org/vuls/id/661243 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:043 http://www.redhat.com/support/errata/RHSA-2003-051.html http://www.redhat.com/support/errata/RHSA-2003-052.html http://www.redhat.com/support/errata/RHSA-2003-168&# •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Unknown vulnerability in the chk_trans.c of the libkrb5 library for MIT Kerberos V5 before 1.2.5 allows users from one realm to impersonate users in other realms that have the same inter-realm keys. Vulnerabilidad desconocida en chk_trans.c de la librería libkrb5 de MIT Kerberos V5 anteriores a 1.2.5 permite a usuarios de un dominio impersonar a usuarios de otros dominios que tienen las mismas claves inter-dominios. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000639 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-001-multiple.txt http://www.kb.cert.org/vuls/id/684563 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:043 http://www.redhat.com/support/errata/RHSA-2003-051.html http://www.redhat.com/support/errata/RHSA-2003-052.html http://www.redhat.com/support/errata/RHSA-2003-168.html http://www.securityfocus.com/bid/6714 https://exchange •

CVSS: 5.0EPSS: 8%CPEs: 4EXPL: 0

Integer signedness error in MIT Kerberos V5 ASN.1 decoder before krb5 1.2.5 allows remote attackers to cause a denial of service via a large unsigned data element length, which is later used as a negative value. Error de falta de signo en enteros en el decodificador MIT Kerberos V5 ASN.1 permite a atacantes remotos causar una denegación de servicio mediante un elemento de datos largo sin signo, que es a continuación usado como un valor negativo. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000639 http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-001-multiple.txt http://www.kb.cert.org/vuls/id/587579 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:043 http://www.osvdb.org/4896 http://www.redhat.com/support/errata/RHSA-2003-051.html http://www.redhat.com/support/errata/RHSA-2003-052.html http://www.redhat.com/support/errata/RHSA-2003-168.html http://www.securityfocus.com •