Lucene search

K
cve[email protected]CVE-2002-1235
HistoryNov 04, 2002 - 5:00 a.m.

CVE-2002-1235

2002-11-0405:00:00
web.nvd.nist.gov
23
cve-2002-1235
kadm_ser_in
mit kerberos
kth kerberos
buffer overflow
remote code execution
vulnerability

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.294 Low

EPSS

Percentile

96.9%

The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.

Affected configurations

NVD
Node
kthkth_kerberos_4Range<1.2.1
OR
kthkth_kerberos_5Range<0.5.1
OR
mitkerberos_5Range1.01.2.6
Node
debiandebian_linuxMatch3.0

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.294 Low

EPSS

Percentile

96.9%