Vulnerability Description
The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to downgrade authentication and encryption mechanisms via a man-in-the-middle attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kth | Kth Kerberos | 4 |
References
- http://josefsson.org/ktelnet/kerberos-telnet.htmlExploit
- http://www.kb.cert.org/vuls/id/774587Third Party AdvisoryUS Government Resource
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10640
- http://josefsson.org/ktelnet/kerberos-telnet.htmlExploit
- http://www.kb.cert.org/vuls/id/774587Third Party AdvisoryUS Government Resource
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10640
FAQ
What is CVE-2001-1444?
CVE-2001-1444 is a vulnerability with a CVSS score of 7.5 (HIGH). The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to ...
How severe is CVE-2001-1444?
CVE-2001-1444 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1444?
Check the references section above for vendor advisories and patch information. Affected products include: Kth Kth Kerberos.