Описание
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
A denial of service flaw was found in MIT Kerberos krb5kdc service. An authenticated attacker could use this flaw to cause krb5kdc to exit with an assertion failure by making an invalid S4U2Self or S4U2Proxy request.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | krb5 | Not affected | ||
| Red Hat Enterprise Linux 6 | krb5 | Will not fix | ||
| Red Hat JBoss Enterprise Application Platform 6 | krb5 | Not affected | ||
| Red Hat JBoss Enterprise Web Server 2 | krb5 | Not affected | ||
| Red Hat JBoss Enterprise Web Server 3 | krb5 | Not affected | ||
| Red Hat Enterprise Linux 7 | krb5 | Fixed | RHSA-2018:0666 | 10.04.2018 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker ...
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
ELSA-2018-0666: krb5 security, bug fix, and enhancement update (MODERATE)
EPSS
6.5 Medium
CVSS3