Page 5 of 23 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

Unknown vulnerabilities in Heimdal before 0.5 with unknown impact, possibly in the (1) kadmind and (2) kdc servers, may allow remote or local attackers to gain root or other access, but not via buffer overflows (CVE-2002-1225). • http://marc.info/?l=bugtraq&m=103341355708817&w=2 http://marc.info/?l=bugtraq&m=103462479621246&w=2 http://www.debian.org/security/2002/dsa-178 •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

Multiple buffer overflows in Heimdal before 0.5, possibly in both the (1) kadmind and (2) kdc servers, may allow remote attackers to gain root access. • http://marc.info/?l=bugtraq&m=103341355708817&w=2 http://marc.info/?l=bugtraq&m=103462479621246&w=2 http://www.debian.org/security/2002/dsa-178 http://www.iss.net/security_center/static/10116.php http://www.securityfocus.com/bid/5729 •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 0

Kerberos 5 su (k5su) in FreeBSD 4.4 and earlier relies on the getlogin system call to determine if the user running k5su is root, which could allow a root-initiated process to regain its privileges after it has dropped them. Kerberos 5 su (k5su) en FreeBSD 4.4 y anteriores se basa en la llamada al sistema getlogin para determinar si el usuario que esta ejecutando k5su es root, lo cual podría permitir a procesos sin privilegios, la obtención de permisos si ese proceso tiene un getlogin como root. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:07.k5su.asc http://www.iss.net/security_center/static/7956.php http://www.securityfocus.com/bid/3919 •