First published: Wed Jul 21 2021(Updated: )
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/krb5 | <=1.17-3+deb10u1<=1.17-3<=1.18.3-5 | 1.18.3-6 1.17-3+deb10u2 |
debian/krb5 | 1.17-3+deb10u4 1.17-3+deb10u5 1.18.3-6+deb11u4 1.18.3-6+deb11u3 1.20.1-2+deb12u1 1.20.1-4 | |
MIT Kerberos 5 | <1.18.4 | |
MIT Kerberos 5 | >=1.19.0<1.19.2 | |
Debian Debian Linux | =10.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
Netapp Snapcenter | ||
Oracle Mysql Server | >=8.0.0<=8.0.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-36222.
The severity of CVE-2021-36222 is high with a severity value of 7.5.
MIT Kerberos 5 before 1.18.4 and 1.19.x before 1.19.2 are affected by CVE-2021-36222.
Remote attackers can exploit CVE-2021-36222 to cause a NULL pointer dereference and daemon crash.
You can find more information about CVE-2021-36222 on the MIT Kerberos 5 GitHub page and the NetApp security advisory page.