The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2016-2591.html | |
http://www.securityfocus.com/bid/85392 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1035399 | Third Party Advisory VDB Entry |
https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99 | Patch |
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2016-03-26 01:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-3119
Mitre link : CVE-2016-3119
CVE.ORG link : CVE-2016-3119
JSON object : View
Products Affected
mit
- kerberos_5
opensuse
- opensuse
- leap
CWE