First published: Fri Jun 28 2024(Updated: )
In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields. Reference and upstream patch: <a href="https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef">https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Kerberos 5 (libkrb5) | <1.21.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2294676 is considered high due to the potential for memory corruption and denial of service.
To fix REDHAT-BUG-2294676, upgrade to MIT Kerberos 5 version 1.21.3 or later.
REDHAT-BUG-2294676 is related to improper handling of message tokens which can lead to memory reading issues.
Users of MIT Kerberos 5 versions prior to 1.21.3 are affected by REDHAT-BUG-2294676.
The nature of the vulnerability in REDHAT-BUG-2294676 involves invalid memory reads due to invalid length fields in GSS message tokens.