The read_packet function in knc (Kerberised NetCat) before 1.11-1 is vulnerable to denial of service (memory exhaustion) that can be exploited remotely without authentication, possibly affecting another services running on the targeted host.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html | Exploit Patch Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Nov/65 | Exploit Mailing List Patch Third Party Advisory |
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | Patch Third Party Advisory |
https://github.com/irsl/knc-memory-exhaustion/ | Exploit Patch Third Party Advisory |
http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html | Exploit Patch Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Nov/65 | Exploit Mailing List Patch Third Party Advisory |
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | Patch Third Party Advisory |
https://github.com/irsl/knc-memory-exhaustion/ | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html - Exploit, Patch, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2018/Nov/65 - Exploit, Mailing List, Patch, Third Party Advisory | |
References | () https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 - Patch, Third Party Advisory | |
References | () https://github.com/irsl/knc-memory-exhaustion/ - Exploit, Patch, Third Party Advisory |
Information
Published : 2018-12-20 23:29
Updated : 2024-11-21 03:36
NVD link : CVE-2017-9732
Mitre link : CVE-2017-9732
CVE.ORG link : CVE-2017-9732
JSON object : View
Products Affected
secure-endpoints
- kerberised_netcat
CWE
CWE-400
Uncontrolled Resource Consumption