Описание
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.13.2+dfsg-3 |
| esm-infra-legacy/trusty | released | 1.12+dfsg-2ubuntu5.2 |
| precise | released | 1.10+dfsg~beta1-2ubuntu0.7 |
| trusty | released | 1.12+dfsg-2ubuntu5.2 |
| trusty/esm | released | 1.12+dfsg-2ubuntu5.2 |
| upstream | released | 1.13.2+dfsg-3 |
| vivid | released | 1.12.1+dfsg-18ubuntu0.1 |
| vivid/stable-phone-overlay | released | 1.12.1+dfsg-18ubuntu0.1 |
| vivid/ubuntu-core | released | 1.12.1+dfsg-18ubuntu0.1 |
| wily | released | 1.13.2+dfsg-2ubuntu0.1 |
Показывать по
4 Medium
CVSS2
Связанные уязвимости
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Ker ...
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
4 Medium
CVSS2