Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rw46-7hq3-wqv6

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

EPSS

Процентиль: 91%
0.06393
Низкий

Дефекты

CWE-125

Связанные уязвимости

ubuntu
около 10 лет назад

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

redhat
больше 10 лет назад

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

nvd
около 10 лет назад

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

debian
около 10 лет назад

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Ker ...

suse-cvrf
больше 10 лет назад

Security update for krb5

EPSS

Процентиль: 91%
0.06393
Низкий

Дефекты

CWE-125