Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x83g-f3w6-mr3j

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.

The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.

EPSS

Процентиль: 92%
0.08652
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 14 лет назад

The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.

redhat
больше 14 лет назад

The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.

nvd
больше 14 лет назад

The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.

debian
больше 14 лет назад

The do_standalone function in the MIT krb5 KDC database propagation da ...

oracle-oval
больше 14 лет назад

ELSA-2011-0200: krb5 security update (IMPORTANT)

EPSS

Процентиль: 92%
0.08652
Низкий

Дефекты

CWE-20