Page 5 of 51 results (0.009 seconds)

CVSS: 10.0EPSS: 32%CPEs: 4EXPL: 0

25 Oct 2002 — The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack. La función kadm_ser en el demonio de administración de compatibildad de Ke... • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-026.txt.asc •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 0

16 May 2001 — Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function. • http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-022-01 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 2%CPEs: 8EXPL: 0

09 Jun 2000 — Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the lastrealm variable in the set_tgtkey function. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 2%CPEs: 8EXPL: 0

09 Jun 2000 — Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the localrealm variable in the process_v4 function. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 3%CPEs: 8EXPL: 0

09 Jun 2000 — Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the e_msg variable in the kerb_err_reply function. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 1

09 Jun 2000 — Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote attackers to cause a denial of service via a malformed request. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html •

CVSS: 7.5EPSS: 3%CPEs: 6EXPL: 0

09 Jun 2000 — Kerberos 4 KDC program improperly frees memory twice (aka "double-free"), which allows remote attackers to cause a denial of service. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

16 May 2000 — Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html •

CVSS: 10.0EPSS: 11%CPEs: 8EXPL: 3

16 May 2000 — Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/19924 •

CVSS: 10.0EPSS: 8%CPEs: 8EXPL: 0

16 May 2000 — Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html •