Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3626-1 | krb5 security update |
EUVD |
EUVD-2023-40036 | lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count. |
Ubuntu USN |
USN-6467-1 | Kerberos vulnerability |
Ubuntu USN |
USN-6467-2 | Kerberos vulnerability |
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-11T13:57:10.192Z
Reserved: 2023-06-21T00:00:00.000Z
Link: CVE-2023-36054
Updated: 2024-08-02T16:37:41.270Z
Status : Modified
Published: 2023-08-07T19:15:09.840
Modified: 2024-11-21T08:09:15.227
Link: CVE-2023-36054
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN