Описание
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 1.15.1-2 |
| bionic | not-affected | 1.15.1-2 |
| cosmic | not-affected | 1.15.1-2 |
| devel | not-affected | 1.15.1-2 |
| disco | not-affected | 1.15.1-2 |
| eoan | not-affected | 1.15.1-2 |
| esm-infra-legacy/trusty | released | 1.12+dfsg-2ubuntu5.4 |
| esm-infra/bionic | not-affected | 1.15.1-2 |
| esm-infra/focal | not-affected | 1.15.1-2 |
| esm-infra/xenial | released | 1.13.2+dfsg-5ubuntu2.1 |
Показывать по
EPSS
4 Medium
CVSS2
6.5 Medium
CVSS3
Связанные уязвимости
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker ...
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
ELSA-2018-0666: krb5 security, bug fix, and enhancement update (MODERATE)
EPSS
4 Medium
CVSS2
6.5 Medium
CVSS3