First published: Tue Oct 10 2017(Updated: )
In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =9.0 | |
Heimdal Project Heimdal | <=7.4.0 | |
debian/heimdal | 7.5.0+dfsg-3 7.5.0+dfsg-3+deb10u2 7.7.0+dfsg-2+deb11u3 7.8.git20221117.28daf24+dfsg-2 7.8.git20221117.28daf24+dfsg-3 | |
debian/heimdal | <=7.1.0+dfsg-13<=7.4.0.dfsg.1-2<=7.1.0+dfsg-13+deb9u1 | 7.1.0+dfsg-13+deb9u2 7.5.0+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.