Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hfq9-977x-jj82

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

Ссылки

EPSS

Процентиль: 94%
0.1489
Средний

Дефекты

CWE-787

Связанные уязвимости

ubuntu
почти 18 лет назад

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

redhat
почти 18 лет назад

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

nvd
почти 18 лет назад

Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.

debian
почти 18 лет назад

Stack-based buffer overflow in the rename_principal_2_svc function in ...

oracle-oval
почти 18 лет назад

ELSA-2007-0562: Important: krb5 security update (IMPORTANT)

EPSS

Процентиль: 94%
0.1489
Средний

Дефекты

CWE-787