Mit Krb5-Appl vulnerabilities
4 known vulnerabilities affecting mit/krb5-appl.
Total CVEs
4
CISA KEV
0
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL1HIGH1MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2019-25018HIGHCVSS 7.5≤ 1.0.32021-02-02
CVE-2019-25018 [HIGH] CVE-2019-25018: In the rcp client in MIT krb5-appl through 1.0.3, malicious servers could bypass intended access res
In the rcp client in MIT krb5-appl through 1.0.3, malicious servers could bypass intended access restrictions via the filename of . or an empty filename, similar to CVE-2018-20685 and CVE-2019-7282. The impact is modifying the permissions of the target directory on the client side. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux di
nvd
CVE-2019-25017MEDIUMCVSS 5.9≤ 1.0.32021-02-02
CVE-2019-25017 [MEDIUM] CWE-863 CVE-2019-25017: An issue was discovered in rcp in MIT krb5-appl through 1.0.3. Due to the rcp implementation being d
An issue was discovered in rcp in MIT krb5-appl through 1.0.3. Due to the rcp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the rcp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious rcp server (or
nvd
CVE-2011-4862CRITICALCVSS 10.0ExploitedPoC≤ 1.0.22011-12-25
CVE-2011-4862 [CRITICAL] CWE-120 CVE-2011-4862: Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
nvd
CVE-2011-1526MEDIUMCVSS 6.5fixed in 1.0.12011-07-11
CVE-2011-1526 [MEDIUM] CWE-269 CVE-2011-1526: ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and ea
ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a con
nvd