7.5
CVSSv2

CVE-2017-15088

Published: 23/11/2017 Updated: 26/01/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) up to and including 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote malicious users to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mit kerberos 5

Vendor Advisories

Debian Bug report logs - #871698 krb5: CVE-2017-15088: Buffer overflow in get_matching_data() Package: krb5-pkinit; Maintainer for krb5-pkinit is Sam Hartman <hartmans@debianorg>; Source for krb5-pkinit is src:krb5 (PTS, buildd, popcon) Reported by: kpp <kraynopp@kmru> Date: Thu, 10 Aug 2017 18:33:01 UTC Severity: ...
A stack based buffer overflow was found in the get_matching_data() function, when reading the principal's certificate during pkinit preauthentication If the Certifcate Authority's subject line is sufficiently long, an attacker able to have a specially crafted certificate signed could crash the authentication process, such as kinit, or, possibly, r ...
plugins/preauth/pkinit/pkinit_crypto_opensslc in MIT Kerberos 5 (aka krb5) through 1152 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X509 data, related to the get_matching_data and X509_NAM ...