NetBSD Information for VU#759265
Kerberos client code buffer overflow in kdc_reply_cipher()
- Vendor Information Help Date Notified: 11 Dec 2000
- Statement Date:
- Date Updated: 11 Jan 2001
Status
Unknown. If you are the vendor named above, please contact us to update your status.
Vendor Statement
No statement is currently available from the vendor regarding this vulnerability.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Vendor References
None
Addendum
NetBSD has produced an advisory on this issue. It is available from:
ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-017.txt.asc
They appear to be vulnerable to this issue.
If you have feedback, comments, or additional information about this vulnerability, please send us email.