First published: Mon Aug 01 2016(Updated: )
The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | =1.13 | |
MIT Kerberos 5 | =1.13.1 | |
MIT Kerberos 5 | =1.13.2 | |
MIT Kerberos 5 | =1.13.3 | |
MIT Kerberos 5 | =1.13.4 | |
MIT Kerberos 5 | =1.13.5 | |
MIT Kerberos 5 | =1.13.6 | |
MIT Kerberos 5 | =1.14 | |
MIT Kerberos 5 | =1.14.1 | |
MIT Kerberos 5 | =1.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3120 has a medium severity rating as it allows denial of service attacks against the Key Distribution Center.
To fix CVE-2016-3120, upgrade to MIT Kerberos version 1.13.6 or later, or 1.14.3 or later.
MIT Kerberos versions 1.13.0 to 1.13.5 and 1.14.0 to 1.14.2 are affected by CVE-2016-3120.
CVE-2016-3120 can lead to a denial of service by allowing remote authenticated users to cause service disruptions.
CVE-2016-3120 is exploitable only when the restrict_anonymous_to_tgt option is enabled in the configuration.