First published: Wed Aug 16 2023(Updated: )
kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | >=1.21<1.21.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-39975.
The severity of CVE-2023-39975 is high, with a CVSS score of 8.8.
MIT Kerberos 5 versions 1.21 before 1.21.2 are affected by CVE-2023-39975.
An authenticated user can trigger an authorization-data handling failure to exploit CVE-2023-39975.
Yes, a fix is available in MIT Kerberos 5 version 1.21.2.