Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5729

Опубликовано: 06 мар. 2018
Источник: debian

Описание

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
krb5fixed1.16.1-1package
krb5no-dsawheezypackage

Примечания

  • Fixed by: https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1

Связанные уязвимости

CVSS3: 4.7
ubuntu
почти 8 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.

CVSS3: 4.7
redhat
почти 8 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.

CVSS3: 4.7
nvd
почти 8 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.

CVSS3: 4.7
github
больше 3 лет назад

MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.

CVSS3: 4.7
fstec
около 8 лет назад

Уязвимость сетевого протокола аутентификации Kerberos, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании