Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4h8p-gqwx-mmw3

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

Ссылки

EPSS

Процентиль: 92%
0.0797
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

redhat
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

nvd
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.

debian
около 16 лет назад

The get_input_token function in the SPNEGO implementation in MIT Kerbe ...

oracle-oval
около 16 лет назад

ELSA-2009-0408: krb5 security update (IMPORTANT)

EPSS

Процентиль: 92%
0.0797
Низкий

Дефекты

CWE-119