The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote attackers to downgrade authentication and encryption mechanisms via a man-in-the-middle attack.
Link | Tags |
---|---|
http://josefsson.org/ktelnet/kerberos-telnet.html | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10640 | vdb entry |
http://www.kb.cert.org/vuls/id/774587 | third party advisory us government resource |