
Details, details...
"To exploit this, an attacker authenticates and then sends crafted data to crash the server to get remote code execution access."
Does that authentication have to be successful or not? Because if it does then I think the risks of this exploit are somewhat limited.