Описание
Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.4.3-5ubuntu0.6 |
devel | released | 1.6.dfsg.1-7 |
edgy | released | 1.4.3-9ubuntu1.5 |
feisty | released | 1.4.4-5ubuntu3.3 |
upstream | needs-triage |
Показывать по
EPSS
9 Critical
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
Stack-based buffer overflow in the rename_principal_2_svc function in ...
Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
ELSA-2007-0562: Important: krb5 security update (IMPORTANT)
EPSS
9 Critical
CVSS2