First published: Wed Jan 29 2025(Updated: )
In MIT krb5 release 1.7 and later with incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file, likely causing a process crash.
Affected Software | Affected Version | How to fix |
---|---|---|
MIT Kerberos 5 | >=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2342796 is high due to the potential for an authenticated attacker to cause a process crash.
To fix REDHAT-BUG-2342796, update your MIT krb5 installation to a version later than 1.7 that addresses this vulnerability.
All versions of MIT krb5 from 1.7 and later with incremental propagation enabled are affected by REDHAT-BUG-2342796.
The potential impact of REDHAT-BUG-2342796 includes crashing the kadmind process, leading to denial of service.
The vulnerability identified as REDHAT-BUG-2342796 can be exploited by authenticated attackers.