Количество 14
Количество 14

CVE-2023-36054
lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

CVE-2023-36054
lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

CVE-2023-36054
lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

CVE-2023-36054
CVE-2023-36054
lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 an ...

SUSE-SU-2023:3434-1
Security update for krb5

SUSE-SU-2023:3398-1
Security update for krb5

SUSE-SU-2023:3365-1
Security update for krb5

SUSE-SU-2023:3363-1
Security update for krb5

SUSE-SU-2023:3325-1
Security update for krb5

ROS-20240405-04
Уязвимость krb5-server
GHSA-39q6-4vrm-fv3g
lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

BDU:2024-02770
Уязвимость файла lib/kadm5/kadm_rpc_xdr.c реализации сетевого протокола Kerberos, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2023-6699
ELSA-2023-6699: krb5 security and bug fix update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-36054 lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count. | CVSS3: 6.5 | 1% Низкий | почти 2 года назад |
![]() | CVE-2023-36054 lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count. | CVSS3: 6.5 | 1% Низкий | почти 2 года назад |
![]() | CVE-2023-36054 lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count. | CVSS3: 6.5 | 1% Низкий | почти 2 года назад |
![]() | CVSS3: 6.5 | 1% Низкий | почти 2 года назад | |
CVE-2023-36054 lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 an ... | CVSS3: 6.5 | 1% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3434-1 Security update for krb5 | 1% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3398-1 Security update for krb5 | 1% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3365-1 Security update for krb5 | 1% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3363-1 Security update for krb5 | 1% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3325-1 Security update for krb5 | 1% Низкий | почти 2 года назад | |
![]() | ROS-20240405-04 Уязвимость krb5-server | CVSS3: 6.5 | 1% Низкий | около 1 года назад |
GHSA-39q6-4vrm-fv3g lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count. | CVSS3: 6.5 | 1% Низкий | почти 2 года назад | |
![]() | BDU:2024-02770 Уязвимость файла lib/kadm5/kadm_rpc_xdr.c реализации сетевого протокола Kerberos, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 1% Низкий | почти 2 года назад |
ELSA-2023-6699 ELSA-2023-6699: krb5 security and bug fix update (MODERATE) | больше 1 года назад |
Уязвимостей на страницу