Описание
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
Ссылки
- Third Party AdvisoryVDB Entry
- PatchThird Party Advisory
- Third Party AdvisoryVDB Entry
- PatchThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
Связанные уязвимости
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker ...
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
ELSA-2018-0666: krb5 security, bug fix, and enhancement update (MODERATE)
EPSS
6.5 Medium
CVSS3
4 Medium
CVSS2