Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2001-0034Kerberos vulnerability

4 documents4 sources
Severity
7.2HIGHNVD
EPSS
0.9%
top 24.10%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 16
Latest updateApr 30

Description

KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

NVDkth/kth_kerberos4.1.0.3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mq8w-3qcq-f5hf: KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy response2022-04-30
CVEList
CVE-2001-0034: KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy response2001-05-07

💥Exploits & PoCs

1
Exploit-DB
KTH Kerberos 4 - Arbitrary Proxy Usage2000-12-08
CVE-2001-0034 — KTH Kerberos vulnerability | cvebase