Описание
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | released | 1.16-2ubuntu0.1 |
| cosmic | released | 1.16-2ubuntu1.1 |
| devel | not-affected | 1.16.1-1 |
| disco | not-affected | 1.16.1-1 |
| eoan | not-affected | 1.16.1-1 |
| esm-infra-legacy/trusty | released | 1.12+dfsg-2ubuntu5.4 |
| esm-infra/bionic | released | 1.16-2ubuntu0.1 |
| esm-infra/focal | not-affected | 1.16.1-1 |
| esm-infra/xenial | released | 1.13.2+dfsg-5ubuntu2.1 |
Показывать по
Ссылки на источники
EPSS
6.5 Medium
CVSS2
4.7 Medium
CVSS3
Связанные уязвимости
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
MIT krb5 1.6 or later allows an authenticated kadmin with permission t ...
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
Уязвимость сетевого протокола аутентификации Kerberos, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
6.5 Medium
CVSS2
4.7 Medium
CVSS3