CVE-2015-2695Release of Invalid Pointer or Reference in Kerberos 5

Severity
5.0MEDIUMNVD
EPSS
5.4%
top 9.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 9
Latest updateMay 13

Description

lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages8 packages

NVDmit/kerberos_5< 1.14
Debianmit/krb5< 1.13.2+dfsg-3+3
NVDopensuse/leap42.1
NVDoracle/solaris11.3
NVDopensuse/opensuse13.1, 13.2+1

Also affects: Debian Linux 7.0, 8.0, 9.0, Ubuntu Linux 12.04, 14.04, 15.04, 15.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-px5h-p825-xfmc: lib/gssapi/spnego/spnego_mech2022-05-13
OSV
CVE-2015-2695: lib/gssapi/spnego/spnego_mech2015-11-09
CVEList
CVE-2015-2695: lib/gssapi/spnego/spnego_mech2015-11-09

📋Vendor Advisories

3
Ubuntu
Kerberos vulnerabilities2015-11-12
Red Hat
krb5: SPNEGO context aliasing bugs2015-09-14
Debian
CVE-2015-2695: krb5 - lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies ...2015

💬Community

2
Bugzilla
CVE-2015-2695 krb5: SPNEGO context aliasing bugs2015-10-28
Bugzilla
CVE-2015-2697 CVE-2015-2696 CVE-2015-2695 krb5: various flaws [fedora-all]2015-10-28
CVE-2015-2695 — Release of Invalid Pointer or Reference | cvebase