First published: Wed Sep 06 2017(Updated: )
Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kerberos | =1.14 | |
Kerberos | =1.14-alpha1 | |
Kerberos | =1.14-beta1 | |
Kerberos | =1.14-beta2 | |
Kerberos | =1.14.1 | |
Kerberos | =1.14.2 | |
Kerberos | =1.14.3 | |
Kerberos | =1.14.4 | |
Kerberos | =1.14.5 | |
Kerberos | =1.15 | |
Kerberos | =1.15.1 | |
Kerberos | =1.15.1-beta1 | |
Kerberos | =1.15.1-beta2 | |
Red Hat Fedora | =25 | |
Red Hat Fedora | =26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-11462 is classified as medium impact due to the possibility of unspecified impacts through automatic deletion of security contexts.
To fix CVE-2017-11462, upgrade to the latest patched version of MIT Kerberos 5, specifically versions 1.14.6 or later.
CVE-2017-11462 affects MIT Kerberos 5 versions 1.14.0 to 1.15.1, including various beta versions.
CVE-2017-11462 does not directly lead to remote code execution, but it could potentially allow for an elevation of privileges through the vulnerability.
CVE-2017-11462 primarily affects MIT Kerberos 5 implementations on various UNIX-like operating systems that utilize these Kerberos versions.