5
CVSSv2

CVE-2017-17439

Published: 06/12/2017 Updated: 30/12/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In Heimdal up to and including 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c.

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 9.0

heimdal project heimdal

Vendor Advisories

Debian Bug report logs - #878144 CVE-2017-17439: Remote unauthenticated DoS in Heimdal-KDC 71 Package: heimdal-kdc; Maintainer for heimdal-kdc is Brian May <bam@debianorg>; Source for heimdal-kdc is src:heimdal (PTS, buildd, popcon) Reported by: Michael Eder <eder@fstumde> Date: Tue, 10 Oct 2017 12:15:02 UTC Sev ...
Michael Eder and Thomas Kittel discovered that Heimdal, an implementation of Kerberos 5 that aims to be compatible with MIT Kerberos, did not correctly handle ASN1 data This would allow an unauthenticated remote attacker to cause a denial of service (crash of the KDC daemon) by sending maliciously crafted packets For the stable distribution (str ...