Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the localrealm variable in the process_v4 function.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html | Broken Link |
http://ciac.llnl.gov/ciac/bulletins/k-051.shtml | Broken Link |
http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt | Patch Vendor Advisory |
http://www.cert.org/advisories/CA-2000-11.html | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/1338 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
02 Feb 2021, 17:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cygnus:cygnus_network_security:*:*:*:*:*:*:*:* cpe:2.3:a:cygnus:kerbnet:*:*:*:*:*:*:*:* |
cpe:2.3:a:kerbnet_project:kerbnet:-:*:*:*:*:*:*:* cpe:2.3:a:mit:kerberos:4.0:patch10:*:*:*:*:*:* cpe:2.3:a:cygnus_network_security_project:cygnus_network_security:-:*:*:*:*:*:*:* cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:* cpe:2.3:a:mit:kerberos:4.0:-:*:*:*:*:*:* |
CWE | CWE-120 | |
References | (BUGTRAQ) http://archives.neohapsis.com/archives/bugtraq/2000-06/0064.html - Broken Link | |
References | (CONFIRM) http://web.mit.edu/kerberos/www/advisories/krb4kdc.txt - Patch, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/1338 - Third Party Advisory, VDB Entry | |
References | (CIAC) http://ciac.llnl.gov/ciac/bulletins/k-051.shtml - Broken Link | |
References | (CERT) http://www.cert.org/advisories/CA-2000-11.html - Third Party Advisory, US Government Resource |
Information
Published : 2000-06-09 04:00
Updated : 2023-12-10 10:17
NVD link : CVE-2000-0547
Mitre link : CVE-2000-0547
CVE.ORG link : CVE-2000-0547
JSON object : View
Products Affected
mit
- kerberos
- kerberos_5
kerbnet_project
- kerbnet
cygnus_network_security_project
- cygnus_network_security
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')