Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-2697

Опубликовано: 25 сент. 2015
Источник: redhat
CVSS2: 4
EPSS Низкий

Описание

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

An out-of-bounds flaw was discovered in MIT Kerberos; the build_principal_va() function did not properly duplicate the realm. An authenticated remote attacker could possibly exploit this flaw by sending a TGS request containing a specially crafted realm field and crashing the KDC (denial of service).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4krb5Not affected
Red Hat Enterprise Linux 5krb5Not affected
Red Hat Enterprise Linux 6krb5Will not fix
Red Hat Enterprise Linux 7krb5Will not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1275863krb5: build_principal() memory flaw

EPSS

Процентиль: 91%
0.06393
Низкий

4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

nvd
около 10 лет назад

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

debian
около 10 лет назад

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Ker ...

github
больше 3 лет назад

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

suse-cvrf
больше 10 лет назад

Security update for krb5

EPSS

Процентиль: 91%
0.06393
Низкий

4 Medium

CVSS2