The read_packet function in knc (Kerberised NetCat) before 1.11-1 is vulnerable to denial of service (memory exhaustion) that can be exploited remotely without authentication, possibly affecting another services running on the targeted host.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | third party advisory patch |
http://seclists.org/fulldisclosure/2018/Nov/65 | mailing list patch exploit third party advisory |
http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html | patch exploit vdb entry third party advisory |
https://github.com/irsl/knc-memory-exhaustion/ | exploit third party advisory patch |