Page 28 of 141 results (0.001 seconds)

CVSS: 10.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4884 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 10.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4876 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges. • http://www.ciac.org/ciac/bulletins/j-044.shtml •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in ssh 1.2.26 client with Kerberos V enabled could allow remote attackers to cause a denial of service or execute arbitrary commands via a long DNS hostname that is not properly handled during TGT ticket passing. • http://lists.netspace.org/cgi-bin/wa?A2=ind9811A&L=bugtraq&P=R4814 http://www.osvdb.org/4883 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in Kerberos IV compatibility libraries as used in Kerberos V allows local users to gain root privileges via a long line in a kerberos configuration file, which can be specified via the KRB_CONF environmental variable. • http://marc.info/?l=bugtraq&m=87602167420878&w=2 •