Описание
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.4.3-5ubuntu0.11 |
devel | not-affected | |
edgy | ignored | end of life, was needed |
feisty | ignored | end of life, was needed |
gutsy | ignored | end of life, was needed |
hardy | released | 1.6.dfsg.3~beta1-2ubuntu1.4 |
intrepid | not-affected | |
jaunty | not-affected | |
karmic | not-affected | |
lucid | not-affected |
Показывать по
EPSS
10 Critical
CVSS2
Связанные уязвимости
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/ ...
Integer overflow in the svcauth_gss_get_principal function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (krb5) allows remote attackers to have an unknown impact via a large length value for a GSS client name in an RPC request.
EPSS
10 Critical
CVSS2