First published: Mon Aug 23 2021(Updated: )
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | <1.18.5 | |
MIT Kerberos 5 | >=1.19.0<1.19.3 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
Starwindsoftware Starwind Virtual San | =v8r13-14338 | |
Oracle Communications Cloud Native Core Network Slice Selection Function | =22.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37750 is a vulnerability in the Key Distribution Center (KDC) in MIT Kerberos 5 that allows for a NULL pointer dereference via a FAST inner body that lacks a server field.
CVE-2021-37750 affects MIT Kerberos 5 versions before 1.18.5 and 1.19.x before 1.19.3, leading to a NULL pointer dereference in kdc/do_tgs_req.c.
CVE-2021-37750 has a severity rating of 6.5, which is classified as medium.
To fix CVE-2021-37750, it is recommended to upgrade to MIT Kerberos 5 version 1.18.5 or apply the necessary patches provided by the vendor.
Yes, you can find more information about CVE-2021-37750 at the following references: [Link 1](https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49), [Link 2](https://github.com/krb5/krb5/releases), [Link 3](https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html).