Информационная безопасность
[RU] switch to English


Уязвимости безопасности в MIT Kerberos 5
Опубликовано:11 февраля 2011 г.
Источник:
SecurityVulns ID:11423
Тип:удаленная
Уровень опасности:
5/10
Описание:DoS против kpropd и KDC.
Затронутые продукты:MIT : krb5 1.9
CVE:CVE-2011-0281 (The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.)
 CVE-2010-4022 (The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.)
Оригинальный текстdocumentMIT, MITKRB5-SA-2011-001 kpropd denial of service [CVE-2010-4022] (11.02.2011)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород