ID CVE-2003-0138
Summary Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack.
References
Vulnerable Configurations
  • cpe:2.3:a:mit:kerberos:4:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos:4:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 19-10-2018 - 15:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
accepted 2007-04-25T19:52:23.652-04:00
class vulnerability
contributors
  • name Jay Beale
    organization Bastille Linux
  • name Jay Beale
    organization Bastille Linux
  • name Thomas R. Jones
    organization Maitreya Security
description Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack.
family unix
id oval:org.mitre.oval:def:248
status accepted
submitted 2003-08-14T12:00:00.000-04:00
title Kerberos krb4 Plaintext Attack Vulnerability
version 38
redhat via4
advisories
  • rhsa
    id RHSA-2003:051
  • rhsa
    id RHSA-2003:052
  • rhsa
    id RHSA-2003:091
refmap via4
bid 7113
bugtraq
  • 20030317 MITKRB5-SA-2003-004: Cryptographic weaknesses in Kerberos v4 protocol
  • 20030331 GLSA: krb5 & mit-krb5 (200303-28)
cert-vn VU#623217
confirm http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt
debian
  • DSA-266
  • DSA-269
  • DSA-273
Last major update 19-10-2018 - 15:29
Published 24-03-2003 - 05:00
Last modified 19-10-2018 - 15:29
Back to Top