Vulnerability Name:

CVE-2000-0389 (CCN-4519)

Assigned:2000-05-16
Published:2000-05-16
Updated:2020-01-21
Summary:Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-00:20
krb5 port contains remote and local root exploits.

Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-00:33
kerberosIV distribution contains multiple vulnerabilities under FreeBSD 3.x

Source: BUGTRAQ
Type: UNKNOWN
20000516 BUFFER OVERRUN VULNERABILITIES IN KERBEROS

Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-00:20

Source: MITRE
Type: CNA
CVE-2000-0389

Source: CCN
Type: RHSA-2000:025-08
Kerberos 5 packages

Source: CCN
Type: Kerberos Security Advisory
BUFFER OVERRUN VULNERABILITIES IN KERBEROS

Source: CCN
Type: CERT Advisory CA-2000-06
Multiple Buffer Overflows in Kerberos Authenticated Services

Source: CERT
Type: Third Party Advisory, US Government Resource
CA-2000-06

Source: CCN
Type: CIAC Information Bulletin K-043b
Buffer Overrun Vulnerabilities in Kerberos

Source: CCN
Type: National Infrastructure Protection Center Alert Advisory 02-042
"Buffer Overrun Vulnerability in Kerberos Authentication Protocol"

Source: CCN
Type: OSVDB ID: 1339
MIT Kerberos 4/5 krb_rd_req() Function Remote Overflow

Source: REDHAT
Type: UNKNOWN
RHSA-2000:025

Source: BID
Type: UNKNOWN
1220

Source: CCN
Type: BID-1220
Multiple Vendor Kerberos 5/Kerberos 4 Compatibility krb_rd_req() Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
kerberos-krb-rd-req-bo(4519)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cygnus:cygnus_network_security:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:cygnus:kerbnet:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.0:-:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:redhat:linux:6.2:*:alpha:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:i386:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:sparc:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mit:kerberos_5:1.0:-:*:*:*:*:*:*
  • AND
  • cpe:/a:cygnus:kerbnet:*:*:*:*:*:*:*:*
  • OR cpe:/a:cygnus:cygnus_network_security:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cygnus cygnus network security 4.0
    cygnus kerbnet 5.0
    mit kerberos 4.0
    mit kerberos 5 1.0
    mit kerberos 5 1.1.1
    redhat linux 6.2
    redhat linux 6.2
    redhat linux 6.2
    mit kerberos 5 1.1
    mit kerberos 5 1.1.1
    mit kerberos 5 1.0 -
    cygnus kerbnet *
    cygnus cygnus network security *