First published: Tue May 16 2000(Updated: )
Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kerbnet | =5.0 | |
Cygnus Network Security | =4.0 | |
MIT Kerberos 5 Application | =4.0 | |
MIT Kerberos 5 Application | =1.0 | |
MIT Kerberos 5 Application | =1.1.1 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0392 has a high severity rating due to its potential to allow local users to gain root privileges.
To fix CVE-2000-0392, users should update their Kerberos implementation to a version that addresses the buffer overflow.
CVE-2000-0392 affects local users of systems running vulnerable versions of Kerberos 5, including specific distributions of Red Hat Linux and MIT Kerberos.
The vulnerability in CVE-2000-0392 is caused by a buffer overflow in the ksu utility of Kerberos 5.
CVE-2000-0392 cannot be exploited remotely as it requires local access to the system.