CVE-2015-2697Out-of-bounds Read in Kerberos 5

CWE-125Out-of-bounds Read9 documents8 sources
Severity
4.0MEDIUMNVD
EPSS
6.4%
top 8.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 9
Latest updateMay 13

Description

The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 8.0 | Impact: 2.9

Affected Packages8 packages

Debianmit/krb5< 1.13.2+dfsg-3+3
NVDmit/kerberos_5< 1.14
NVDopensuse/leap42.1
NVDoracle/solaris11.3
NVDopensuse/opensuse13.1, 13.2+1

Also affects: Debian Linux 7.0, 8.0, 9.0, Ubuntu Linux 12.04, 14.04, 15.04, 15.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-rw46-7hq3-wqv6: The build_principal_va function in lib/krb5/krb/bld_princ2022-05-13
CVEList
CVE-2015-2697: The build_principal_va function in lib/krb5/krb/bld_princ2015-11-09
OSV
CVE-2015-2697: The build_principal_va function in lib/krb5/krb/bld_princ2015-11-09

📋Vendor Advisories

3
Ubuntu
Kerberos vulnerabilities2015-11-12
Red Hat
krb5: build_principal() memory flaw2015-09-25
Debian
CVE-2015-2697: krb5 - The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (a...2015

💬Community

2
Bugzilla
CVE-2015-2697 CVE-2015-2696 CVE-2015-2695 krb5: various flaws [fedora-all]2015-10-28
Bugzilla
CVE-2015-2697 krb5: build_principal() memory flaw2015-10-28
CVE-2015-2697 — Out-of-bounds Read in MIT Kerberos 5 | cvebase