Lucene search

K
exploitdbMarcell FodorEDB-ID:21402
HistoryApr 19, 2002 - 12:00 a.m.

OpenSSH 2.x/3.x - Kerberos 4 TGT/AFS Token Buffer Overflow

2002-04-1900:00:00
Marcell Fodor
www.exploit-db.com
133

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/4560/info

A buffer overflow condition exists in the OpenSSH server. The condition is exploitable by attackers with valid user credentials in versions 2.9.9 and higher. Exploitation does not require valid user credentials in versions prior to 2.9.9.

The vulnerability is related to the handling of Kerberos 4 TGT/AFS tokens passed by the client. An unbounded string copy operation may result in a stack overflow if the TGT/token data is malformed. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21402.tar

AI Score

7.4

Confidence

Low

Related for EDB-ID:21402