Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
MIT Kerberos KDC 'do_as_req.c'双重释放内存破坏漏洞
Vulnerability Description
Kerberos是一款广泛使用的超强加密来验证客户端和服务器端的网络协议。 MIT Kerberos在"do_as_req.c"的实现上存在远程内存破坏漏洞,攻击者可利用此漏洞以超级用户的权限,借助包含类型化数据的e_data字段,执行任意代码,完全控制受影响计算机,造成拒绝服务。 如果krb5-1.7或较高版本的KDC配置为响应PKINIT请求,即启用了"初始验证公开密钥加密"PKINIT功能,就会受到双重释放内存破坏漏洞的影响,造成程序崩溃或执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A