Description
KTH Kerberos IV allows local users to specify an alternate proxy using the krb4_proxy variable, which allows the user to generate false proxy responses and possibly gain privileges.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Jouko Pynnonen · textremotemultiple
https://www.exploit-db.com/exploits/20491
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/5733
Exploit, Patch, Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2000-12/0093.html
Patch mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2000-12/0105.html
Scores
EPSS
0.0091
EPSS Percentile
76.0%
Details
Status
published
Products (1)
kth/kth_kerberos
< 4.1.0.3
Published
Feb 16, 2001
Tracked Since
Feb 18, 2026