Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-3120

Опубликовано: 19 июл. 2016
Источник: redhat
CVSS3: 5.3
CVSS2: 3.5
EPSS Низкий

Описание

The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.

A NULL pointer dereference flaw was found in MIT Kerberos krb5kdc service. An authenticated attacker could use this flaw to cause krb5kdc to dereference a null pointer and crash by making an S4U2Self request, if the restrict_anonymous_to_tgt option was set to true.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5krb5Not affected
Red Hat Enterprise Linux 6krb5Will not fix
Red Hat JBoss Enterprise Application Platform 6krb5Not affected
Red Hat JBoss Enterprise Application Platform 7krb5Not affected
Red Hat JBoss Enterprise Web Server 2krb5Not affected
Red Hat JBoss Enterprise Web Server 3krb5Not affected
Red Hat Enterprise Linux 7krb5FixedRHSA-2016:259103.11.2016

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1361050krb5: S4U2Self KDC crash when anon is restricted

EPSS

Процентиль: 82%
0.01887
Низкий

5.3 Medium

CVSS3

3.5 Low

CVSS2

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 9 лет назад

The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.

CVSS3: 6.5
nvd
около 9 лет назад

The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.

CVSS3: 6.5
debian
около 9 лет назад

The validate_as_request function in kdc_util.c in the Key Distribution ...

suse-cvrf
около 9 лет назад

Security update for krb5

suse-cvrf
около 9 лет назад

Security update for krb5

EPSS

Процентиль: 82%
0.01887
Низкий

5.3 Medium

CVSS3

3.5 Low

CVSS2