Total vulnerabilities in the database
Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an attacker to create krb4 tickets for unauthorized principals using a cut-and-paste attack and "ticket splicing."
Software | From | Fixed in |
---|---|---|
mit / kerberos | 4 | 4.x |