Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-36054

Опубликовано: 07 авг. 2023
Источник: redhat
CVSS3: 6.5

Описание

lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

A vulnerability was found in the _xdr_kadm5_principal_ent_rec() function in lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (krb5). This issue occurs due to lack of validation in the relationship between n_key_data and the key_data array count, leading to the freeing of uninitialized pointers. This may allow a remote authenticated attacker to send a specially crafted request that causes the kadmind process to crash, resulting in a denial of service (DoS).

Отчет

Remote code execution is unlikely. An attacker with control of a kadmin server can only cause a kadmin client to crash by freeing uninitialized pointers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6krb5Not affected
Red Hat Enterprise Linux 7krb5Not affected
Red Hat Enterprise Linux 8krb5Not affected
Red Hat JBoss Enterprise Application Platform 6krb5Out of support scope
Red Hat Enterprise Linux 9krb5FixedRHSA-2023:669907.11.2023
Red Hat Enterprise Linux 9krb5FixedRHSA-2023:669907.11.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-824
https://bugzilla.redhat.com/show_bug.cgi?id=2230178krb5: Denial of service through freeing uninitialized pointer

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 2 года назад

lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

CVSS3: 6.5
nvd
почти 2 года назад

lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.

CVSS3: 6.5
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 6.5
debian
почти 2 года назад

lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 an ...

suse-cvrf
почти 2 года назад

Security update for krb5

6.5 Medium

CVSS3