Vulnerabilities > KTH
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2001-08-27 | CVE-2001-1443 | Remote Security vulnerability in KTH Kerberos 4/5 KTH Kerberos IV and Kerberos V (Heimdal) for Telnet clients do not encrypt connections if the server does not support the requested encryption, which allows remote attackers to read communications via a man-in-the-middle attack. | 5.0 |
2001-02-16 | CVE-2001-0036 | Unspecified vulnerability in KTH Kerberos 4 KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file. | 1.2 |
2001-02-16 | CVE-2001-0035 | Unspecified vulnerability in KTH Kerberos 4 Buffer overflow in the kdc_reply_cipher function in KTH Kerberos IV allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long authentication request. | 7.2 |
2001-02-16 | CVE-2001-0034 | Unspecified vulnerability in KTH Kerberos KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges. | 7.2 |
2001-02-16 | CVE-2001-0033 | KTH Kerberos IV allows local users to change the configuration of a Kerberos server running at an elevated privilege by specifying an alternate directory using with the KRBCONFDIR environmental variable, which allows the user to gain additional privileges. | 7.2 |
1996-11-22 | CVE-1999-1099 | Unspecified vulnerability in KTH Kerberos 4 Kerberos 4 allows remote attackers to obtain sensitive information via a malformed UDP packet that generates an error string that inadvertently includes the realm name and the last user. | 5.0 |