Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-1529

Опубликовано: 20 окт. 2011
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.8

Описание

The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.

РелизСтатусПримечание
devel

not-affected

1.9.1+dfsg-1ubuntu2.1
hardy

not-affected

lucid

released

1.8.1+dfsg-2ubuntu0.10
maverick

released

1.8.1+dfsg-5ubuntu0.8
natty

released

1.8.3+dfsg-5ubuntu2.2
oneiric

released

1.9.1+dfsg-1ubuntu1.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 83%
0.01954
Низкий

7.8 High

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.

nvd
больше 13 лет назад

The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.

debian
больше 13 лет назад

The lookup_lockout_policy function in the Key Distribution Center (KDC ...

github
около 3 лет назад

The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.

oracle-oval
больше 13 лет назад

ELSA-2011-1379: krb5 security update (MODERATE)

EPSS

Процентиль: 83%
0.01954
Низкий

7.8 High

CVSS2