CVE-2016-3120
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
01/08/2016
Last modified:
12/04/2025
Description
The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
- http://rhn.redhat.com/errata/RHSA-2016-2591.html
- http://web.mit.edu/kerberos/krb5-1.13/
- http://web.mit.edu/kerberos/krb5-1.14/
- http://www.securityfocus.com/bid/92132
- http://www.securitytracker.com/id/1036442
- https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
- https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
- http://rhn.redhat.com/errata/RHSA-2016-2591.html
- http://web.mit.edu/kerberos/krb5-1.13/
- http://web.mit.edu/kerberos/krb5-1.14/
- http://www.securityfocus.com/bid/92132
- http://www.securitytracker.com/id/1036442
- https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
- https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/



