Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-0600
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Heap overflow in the KTH Kerberos 4 FTP client 4-1.1.1 allows remote malicious servers to execute arbitrary code on the client via a long response to a passive (PASV) mode request.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
KTH eBones Kerberos4 FTP客户端被动模式堆破坏漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
KTH FTP客户端是一款免费的实现对Kerberos4 eBones支持的程序,可使用在Unix和Linux操作系统下。 KTH eBones Kerberos4 FTP客户端对服务器响应其被动模式请求的数据处理存在漏洞,可导致堆破坏,使攻击者以ftp进程权限在目标系统上执行任意命令。攻击者可以伪造服务器数据,当客户端提交被动模式请求,服务端如果以超长的字符串代替IP地址和端口数据发送给客户端,客户端在解析此响应时可导致堆破坏,精心构建此数据可使攻击者以FTP进程的权限在目标系统上执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-0600
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-0600
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2002-0600

No comments yet


Leave a comment