Описание
The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.10.1+dfsg-4+nmu1 |
esm-infra-legacy/trusty | not-affected | 1.10.1+dfsg-4+nmu1 |
hardy | ignored | end of life |
lucid | released | 1.8.1+dfsg-2ubuntu0.13 |
oneiric | ignored | end of life |
precise | released | 1.10+dfsg~beta1-2ubuntu0.5 |
quantal | ignored | end of life |
raring | not-affected | 1.10.1+dfsg-4+nmu1 |
saucy | not-affected | 1.10.1+dfsg-4+nmu1 |
trusty | not-affected | 1.10.1+dfsg-4+nmu1 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_cr ...
The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
EPSS
5 Medium
CVSS2