Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-1014

Опубликовано: 06 авг. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9

Описание

The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.

РелизСтатусПримечание
devel

not-affected

1.10.1+dfsg-2
hardy

not-affected

1.6.dfsg.3~beta1-2ubuntu1.8
lucid

not-affected

1.8.1+dfsg-2ubuntu0.10
natty

not-affected

1.8.3+dfsg-5ubuntu2.2
oneiric

not-affected

1.9.1+dfsg-1ubuntu2.2
precise

released

1.10+dfsg~beta1-2ubuntu0.3
upstream

needs-triage

Показывать по

EPSS

Процентиль: 88%
0.04152
Низкий

9 Critical

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.

nvd
больше 13 лет назад

The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.

debian
больше 13 лет назад

The process_as_req function in the Key Distribution Center (KDC) in MI ...

github
больше 3 лет назад

The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.

fstec
около 12 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 88%
0.04152
Низкий

9 Critical

CVSS2