{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2017-9732", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The read_packet function in knc (Kerberised NetCat) before 1.11-1 is vulnerable to denial of service (memory exhaustion) that can be exploited remotely without authentication, possibly affecting another services running on the targeted host." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20181130 CVE-2017-9732: knc (kerberized netcat) memory exhaustion", "refsource" : "FULLDISC", "url" : "http://seclists.org/fulldisclosure/2018/Nov/65" }, { "name" : "http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html", "refsource" : "MISC", "url" : "http://packetstormsecurity.com/files/150534/knc-Kerberized-NetCat-Denial-Of-Service.html" }, { "name" : "https://github.com/irsl/knc-memory-exhaustion/", "refsource" : "MISC", "url" : "https://github.com/irsl/knc-memory-exhaustion/" }, { "name" : "https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1", "refsource" : "CONFIRM", "url" : "https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1" } ] } }