First published: Fri Jun 09 2000(Updated: )
Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the localrealm variable in the process_v4 function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cygnus Network Security | ||
kerbnet | ||
MIT Kerberos 5 | <4.0 | |
MIT Kerberos 5 | =4.0 | |
MIT Kerberos 5 | =4.0-patch10 | |
MIT Kerberos 5 | >=1.0<=1.0.7 | |
MIT Kerberos 5 | =1.1 | |
MIT Kerberos 5 | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0547 has been categorized as having a high severity due to its potential for remote denial of service attacks.
To fix CVE-2000-0547, it is recommended to upgrade to a version of MIT Kerberos 5 that addresses the buffer overflow issue.
CVE-2000-0547 affects versions of MIT Kerberos 5 up to 4.0 and certain early 5.x versions.
Yes, CVE-2000-0547 can be exploited remotely, allowing attackers to potentially cause a denial of service.
The impact of CVE-2000-0547 on affected systems includes the potential crashing of the Kerberos KDC service, resulting in service unavailability.