7.5 High
AI Score
Confidence
High
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.121 Low
EPSS
Percentile
95.3%
It was discovered that Kerberos did not correctly handle invalid AES
blocks. An unauthenticated remote attacker could send specially crafted
traffic that would crash the KDC service, leading to a denial of service,
or possibly execute arbitrary code with root privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 9.10 | noarch | libk5crypto3 | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | krb5-admin-server | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | krb5-clients | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | krb5-ftpd | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | krb5-kdc | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | krb5-kdc-ldap | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | krb5-pkinit | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | krb5-rsh-server | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | krb5-telnetd | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |
Ubuntu | 9.10 | noarch | krb5-user | < 1.7dfsg~beta3-1ubuntu0.3 | UNKNOWN |