ALAS-2013-208 ---- krb5ID: oval:org.secpod.oval:def:1600260 | Date: (C)2016-05-19 (M)2023-12-07 |
Class: PATCH | Family: unix |
It was found that kadmind"s kpasswd service did not perform any validation on incoming network packets, causing it to reply to all requests. A remote attacker could use this flaw to send spoofed packets to a kpasswd service that appear to come from kadmind on a different server, causing the services to keep replying packets to each other, consuming network bandwidth and CPU
Platform: |
Amazon Linux AMI |