Описание
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | krb5 | Will not fix | ||
| Red Hat Enterprise Linux 6 | krb5 | Will not fix | ||
| Red Hat Enterprise Linux 8 | krb5 | Not affected | ||
| Red Hat JBoss Core Services | krb5 | Will not fix | ||
| Red Hat JBoss Enterprise Application Platform 6 | krb5 | Will not fix | ||
| Red Hat JBoss Enterprise Web Server 2 | krb5 | Will not fix | ||
| Red Hat Enterprise Linux 7 | krb5 | Fixed | RHSA-2018:3071 | 30.10.2018 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.7 Medium
CVSS3
Связанные уязвимости
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
MIT krb5 1.6 or later allows an authenticated kadmin with permission t ...
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
Уязвимость сетевого протокола аутентификации Kerberos, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
4.7 Medium
CVSS3