Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kth kth kerberos vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-0677
telnetd in Heimdal 0.6.x prior to 0.6.6 and 0.7.x prior to 0.7.2 allows remote unauthenticated malicious users to cause a denial of service (server crash) via unknown vectors that trigger a null dereference.
Kth Heimdal 0.7.1
Kth Heimdal 0.7.1.1
Kth Heimdal 0.6.1
Kth Heimdal 0.7.1.2
Kth Heimdal 0.7.1.3
Kth Heimdal 0.6.4
Kth Heimdal 0.6.5
Kth Heimdal 0.6.2
Kth Heimdal 0.6.3
NA
CVE-2006-0582
Unspecified vulnerability in rshd in Heimdal 0.6.x prior to 0.6.6 and 0.7.x prior to 0.7.2, when storing forwarded credentials, allows malicious users to overwrite arbitrary files and change file ownership via unknown vectors.
Kth Heimdal 0.6.2
Kth Heimdal 0.6.3
Kth Heimdal 0.6.1
Kth Heimdal 0.7.1.2
Kth Heimdal 0.7.1.3
Kth Heimdal 0.6.4
Kth Heimdal 0.6.5
Kth Heimdal 0.7.1
Kth Heimdal 0.7.1.1
NA
CVE-2002-1235
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and previous versions, (2) kadmind in KTH Kerberos 4 (eBones) prior to 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) prior to 0.5.1 when comp...
Kth Kth Kerberos 4
Kth Kth Kerberos 5
Mit Kerberos 5
Debian Debian Linux 3.0
NA
CVE-2002-1146
The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and previous versions, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual bo...
Gnu Glibc
NA
CVE-2002-0754
Kerberos 5 su (k5su) in FreeBSD 4.4 and previous versions relies on the getlogin system call to determine if the user running k5su is root, which could allow a root-initiated process to regain its privileges after it has dropped them.
Freebsd Heimdal 0.4e
Kth Heimdal 0.4e
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
NA
CVE-2002-0600
Heap overflow in the KTH Kerberos 4 FTP client 4-1.1.1 allows remote malicious servers to execute arbitrary code on the client via a long response to a passive (PASV) mode request.
Kth Kth Kerberos 4 1.0.2
Kth Kth Kerberos 4 1.0.3
Kth Kth Kerberos 4 1.0.4
Kth Kth Kerberos 4 1.1.1
Luke Mewburn Lukemftp 1.5
NA
CVE-2001-1443
KTH Kerberos IV and Kerberos V (Heimdal) for Telnet clients do not encrypt connections if the server does not support the requested encryption, which allows remote malicious users to read communications via a man-in-the-middle attack.
Kth Kth Kerberos 4
Kth Kth Kerberos 5
NA
CVE-2001-1444
The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote malicious users to downgrade authentication and encryption mechanisms via a man-in-the-middle...
Kth Kth Kerberos 4
Kth Kth Kerberos 5
NA
CVE-2001-0033
KTH Kerberos IV allows local users to change the configuration of a Kerberos server running at an elevated privilege by specifying an alternate directory using with the KRBCONFDIR environmental variable, which allows the user to gain additional privileges.
Kth Kth Kerberos 4
Netbsd Netbsd 1.5
NA
CVE-2001-0034
KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges.
Kth Kth Kerberos
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »