First published: Fri Jun 28 2024(Updated: )
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/krb5 | 1.18.3-6+deb11u5 1.20.1-2+deb12u2 1.21.3-3 | |
MIT Kerberos 5 | <1.21.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37370 is considered a medium severity vulnerability due to its potential impact on data confidentiality.
To fix CVE-2024-37370, upgrade to versions 1.21.3 or later of MIT Kerberos 5.
CVE-2024-37370 affects MIT Kerberos 5 versions prior to 1.21.3 and IBM QRadar SIEM versions up to 7.5.0 UP9 IF03.
CVE-2024-37370 allows an attacker to modify the plaintext Extra Count field of a GSS krb5 wrap token.
Applications using Kerberos may incorrectly interpret truncated unwrapped tokens, potentially leading to confidentiality issues.