First published: Mon Nov 09 2015(Updated: )
lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | <1.14 | |
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
SUSE Linux Enterprise Desktop with Beagle | =12 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2696 has been classified as a medium severity vulnerability.
To fix CVE-2015-2696, update your MIT Kerberos 5 installation to version 1.14 or later.
CVE-2015-2696 affects MIT Kerberos 5 before version 1.14 and specific versions of openSUSE, SUSE Linux Enterprise, and Debian.
CVE-2015-2696 can cause a denial of service by crashing the process due to mishandled IAKERB packets.
There are no effective workarounds for CVE-2015-2696; the best action is to apply the relevant updates.