Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-1013

Опубликовано: 01 июн. 2012
Источник: redhat
CVSS2: 3.5
EPSS Низкий

Описание

The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.

Отчет

Not vulnerable. This issue did not affect the versions of krb5 as shipped with Red Hat Enterprise Linux 4 and 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4krb5Not affected
Red Hat Enterprise Linux 5krb5Not affected
Red Hat Enterprise Linux 6krb5FixedRHSA-2012:113131.07.2012

Показывать по

Дополнительная информация

Статус:

Low

EPSS

Процентиль: 77%
0.01108
Низкий

3.5 Low

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.

nvd
около 13 лет назад

The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.

debian
около 13 лет назад

The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmi ...

github
больше 3 лет назад

The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.

oracle-oval
около 13 лет назад

ELSA-2012-1131: krb5 security update (IMPORTANT)

EPSS

Процентиль: 77%
0.01108
Низкий

3.5 Low

CVSS2