First published: Tue Jun 11 2002(Updated: )
Heap overflow in the KTH Kerberos 4 FTP client 4-1.1.1 allows remote malicious servers to execute arbitrary code on the client via a long response to a passive (PASV) mode request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KTH Kerberos | =4_1.0.3 | |
KTH Kerberos | =4_1.0.2 | |
Luke Mewburn lukemftp | =1.5 | |
KTH Kerberos | =4_1.1.1 | |
KTH Kerberos | =4_1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0600 has a high severity due to the potential for remote code execution.
To fix CVE-2002-0600, update the KTH Kerberos FTP client to a patched version that resolves the heap overflow vulnerability.
CVE-2002-0600 affects KTH Kerberos versions 4_1.0.2, 4_1.0.3, 4_1.0.4, and 4_1.1.1, as well as Luke Mewburn lukemftp version 1.5.
CVE-2002-0600 is caused by a heap overflow vulnerability in the KTH Kerberos 4 FTP client that allows remote servers to send excessively long responses.
The potential consequences of CVE-2002-0600 include remote code execution and compromising the security of the affected system.