| Vulnerability Name: | CCN-5189 | ||||||
| Published: | 2000-08-28 | ||||||
| Updated: | 2000-08-28 | ||||||
| Summary: | Many programs that use Kerberos authentication could allow a remote attacker to spoof Key Distribution Center (KDC) responses. If the login service is not registered with the KDC, or if the service's secret key is not installed on the host, the login service bypasses verification. This could allow a remote attacker to login by spoofing KDC responses. | ||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
| CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
| Vulnerability Consequences: | Bypass Security | ||||||
| References: | Source: CCN Type: BugTraq Mailing List, Mon Aug 28 2000 - 10:27:12 CDT Kerberos password authentication issues Source: CCN Type: comp.protocols.kerberos Newsgroup article Kerberos FAQ, v2.0 (last modified 8/18/2000) Source: CCN Type: BID-1616 Kerberos KDC Spoofing Vulnerability Source: XF Type: UNKNOWN kerberos-kdc-spoof(5189) | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||