Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2010-0629

Опубликовано: 07 апр. 2010
Источник: nvd
CVSS3: 6.5
CVSS2: 4
EPSS Низкий

Описание

Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*
Версия от 1.5 (включая) до 1.6.3 (включая)
Конфигурация 2
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
Конфигурация 4

Одно из

cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

EPSS

Процентиль: 84%
0.02284
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 15 лет назад

Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.

redhat
больше 15 лет назад

Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.

CVSS3: 6.5
debian
около 15 лет назад

Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmin ...

CVSS3: 6.5
github
около 3 лет назад

Use-after-free vulnerability in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote authenticated users to cause a denial of service (daemon crash) via a request from a kadmin client that sends an invalid API version number.

oracle-oval
около 15 лет назад

ELSA-2010-0343: krb5 security and bug fix update (IMPORTANT)

EPSS

Процентиль: 84%
0.02284
Низкий

6.5 Medium

CVSS3

4 Medium

CVSS2

Дефекты

CWE-416