First published: Mon Nov 09 2015(Updated: )
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kerberos | <1.14 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
SUSE Linux | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
SUSE Linux Enterprise Desktop | =12 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2697 is classified as a denial of service vulnerability that affects certain versions of MIT Kerberos 5.
To fix CVE-2015-2697, upgrade to MIT Kerberos 5 version 1.14 or later.
CVE-2015-2697 affects various operating systems including specific versions of MIT Kerberos 5, Oracle Solaris, Ubuntu Linux, Debian GNU/Linux, and openSUSE.
CVE-2015-2697 allows remote authenticated users to trigger a denial of service by causing an out-of-bounds read and KDC crash.
The exploitation of CVE-2015-2697 involves sending a TGS request with an initial '\0' character in the realm field, which requires some knowledge of the system configuration.