Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-11368

Опубликовано: 13 июл. 2017
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.

A denial of service flaw was found in MIT Kerberos krb5kdc service. An authenticated attacker could use this flaw to cause krb5kdc to exit with an assertion failure by making an invalid S4U2Self or S4U2Proxy request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5krb5Not affected
Red Hat Enterprise Linux 6krb5Will not fix
Red Hat JBoss Enterprise Application Platform 6krb5Not affected
Red Hat JBoss Enterprise Web Server 2krb5Not affected
Red Hat JBoss Enterprise Web Server 3krb5Not affected
Red Hat Enterprise Linux 7krb5FixedRHSA-2018:066610.04.2018

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1473560krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure

EPSS

Процентиль: 66%
0.00528
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.

CVSS3: 6.5
nvd
больше 8 лет назад

In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.

CVSS3: 6.5
debian
больше 8 лет назад

In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker ...

CVSS3: 6.5
github
больше 3 лет назад

In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.

oracle-oval
больше 7 лет назад

ELSA-2018-0666: krb5 security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 66%
0.00528
Низкий

6.5 Medium

CVSS3