Vulnerability Name: | CVE-2001-1444 (CCN-10640) | ||||||||
Assigned: | 2001-08-27 | ||||||||
Published: | 2001-08-27 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to downgrade authentication and encryption mechanisms via a man-in-the-middle attack. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2001-1443 Source: MITRE Type: CNA CVE-2001-1444 Source: MISC Type: Exploit http://josefsson.org/ktelnet/kerberos-telnet.html Source: CCN Type: US-CERT VU#390280 KTH Kerberos Telnet implementations do not strictly enforce client encryption request Source: CCN Type: US-CERT VU#774587 Kerberos Telnet protocol does not adequately protect authentication and encryption options Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#774587 Source: CCN Type: OSVDB ID: 18006 KTH / Heimdal Kerberos 4/5 Unencrypted Connection Fallback Source: CCN Type: OSVDB ID: 18007 KTH / Heimdal Kerberos Protocol Cleartext Authentication/Encryption Disclosure Source: XF Type: UNKNOWN kth-kerberos-unencrypted-connection(10640) Source: XF Type: UNKNOWN kth-kerberos-unencrypted-connection(10640) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |