CVE-2023-39975

CWE-4156 documents6 sources
Severity
8.8HIGH
EPSS
1.2%
top 20.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 16
Latest updateJan 15

Description

kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

NVDmit/kerberos_51.211.21.2

Patches

🔴Vulnerability Details

2
CVEList
CVE-2023-39975: kdc/do_tgs_req2023-08-16
GHSA
GHSA-4grv-wgvh-8x82: kdc/do_tgs_req2023-08-16

📋Vendor Advisories

3
Oracle
Oracle Oracle MySQL Risk Matrix: Cluster: General (Kerberos) — CVE-2023-399752024-01-15
Red Hat
krb5: double-free in KDC TGS processing2023-08-16
Debian
CVE-2023-39975: krb5 - kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double fr...2023