CVE-2000-0389 – Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-0389
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/19924 https://www.exploit-db.com/exploits/19925 https://www.exploit-db.com/exploits/19926 http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •
CVE-2000-0390
https://notcve.org/view.php?id=CVE-2000-0390
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4884 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •
CVE-2000-0391
https://notcve.org/view.php?id=CVE-2000-0391
Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html http://www.cert.org/advisories/CA-2000-06.html http://www.osvdb.org/4876 http://www.redhat.com/support/errata/RHSA-2000-025.html http://www.securityfocus.com/bid/1220 •
CVE-1999-0713
https://notcve.org/view.php?id=CVE-1999-0713
The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges. • http://www.ciac.org/ciac/bulletins/j-044.shtml •
CVE-1999-1321
https://notcve.org/view.php?id=CVE-1999-1321
Buffer overflow in ssh 1.2.26 client with Kerberos V enabled could allow remote attackers to cause a denial of service or execute arbitrary commands via a long DNS hostname that is not properly handled during TGT ticket passing. • http://lists.netspace.org/cgi-bin/wa?A2=ind9811A&L=bugtraq&P=R4814 http://www.osvdb.org/4883 •