Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4h8p-gqwx-mmw3

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

Ссылки

EPSS

Процентиль: 87%
0.03433
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 17 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

redhat
почти 17 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

nvd
почти 17 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

debian
почти 17 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerbe ...

oracle-oval
почти 17 лет назад

ELSA-2009-0408: krb5 security update (IMPORTANT)

EPSS

Процентиль: 87%
0.03433
Низкий

Дефекты

CWE-119