Page 24 of 123 results (0.003 seconds)

CVSS: 5.0EPSS: 2%CPEs: 6EXPL: 0

Kerberos 4 KDC program improperly frees memory twice (aka "double-free"), which allows remote attackers to cause a denial of service. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.redhat.com/support/errata/RHSA-2000-031.html http://www.securityfocus.com/bid/1465 •

CVSS: 5.0EPSS: 1%CPEs: 6EXPL: 1

Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote attackers to cause a denial of service via a malformed request. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.redhat.com/support/errata/RHSA-2000-031.html •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the lastrealm variable in the set_tgtkey function. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html http://ciac.llnl.gov/ciac/bulletins/k-051.shtml http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt http://www.cert.org/advisories/CA-2000-11.html http://www.securityfocus.com/bid/1338 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 10.0EPSS: 3%CPEs: 8EXPL: 3

Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/19924 https://www.exploit-db.com/exploits/19925 https://www.exploit-db.com/exploits/19926 http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •