CVE-2017-9732

The read_packet function in knc (Kerberised NetCat) before 1.11-1 is vulnerable to denial of service (memory exhaustion) that can be exploited remotely without authentication, possibly affecting another services running on the targeted host.
References
Link Resource
http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html Exploit Patch Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2018/Nov/65 Exploit Mailing List Patch Third Party Advisory
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 Patch Third Party Advisory
https://github.com/irsl/knc-memory-exhaustion/ Exploit Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:secure-endpoints:kerberised_netcat:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-12-20 23:29

Updated : 2024-02-28 16:48


NVD link : CVE-2017-9732

Mitre link : CVE-2017-9732

CVE.ORG link : CVE-2017-9732


JSON object : View

Products Affected

secure-endpoints

  • kerberised_netcat
CWE
CWE-400

Uncontrolled Resource Consumption