First published: Fri Jun 28 2024(Updated: )
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/krb5 | 1.18.3-6+deb11u5 1.20.1-2+deb12u2 1.21.3-3 | |
Kerberos | <1.21.3 | |
Debian Linux | =11.0 | |
Debian Linux | =12.0 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37371 has been classified with a high severity due to its potential for causing invalid memory reads.
To fix CVE-2024-37371, upgrade to MIT Kerberos 5 version 1.21.3 or later.
Versions of MIT Kerberos 5 earlier than 1.21.3 are affected by CVE-2024-37371.
CVE-2024-37371 impacts IBM QRadar SIEM and IBM QRadar Incident Forensics up to version 7.5.0 UP9 IF03.
CVE-2024-37371 can be exploited through malformed GSS message tokens with invalid length fields.