Vulnerability Name: | CVE-1999-1321 (CCN-8328) | ||||||||
Assigned: | 1998-11-05 | ||||||||
Published: | 1998-11-05 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | Buffer overflow in ssh 1.2.26 client with Kerberos V enabled could allow remote attackers to cause a denial of service or execute arbitrary commands via a long DNS hostname that is not properly handled during TGT ticket passing. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-1999-1321 Source: BUGTRAQ Type: UNKNOWN 19981105 security patch for ssh-1.2.26 kerberos code Source: CCN Type: NetSpace BugTraq Mailing List, 5 Nov 1998 02:38:51 +0200 security patch for ssh-1.2.26 kerberos code Source: OSVDB Type: UNKNOWN 4883 Source: CCN Type: OSVDB ID: 4883 SSH Client Kerberos 5 TGT Overflow Source: XF Type: UNKNOWN ssh-kerberos5-tgt-bo(8328) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |