Description
In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:HExploitability: 1.8 | Impact: 4.7Attack Vector: Network
Complexity: High
Privileges: Low
User Interaction: None
Scope: Changed
Confidentiality: None
Integrity: Low
Availability: High
Affected Packages2 packages
🔴Vulnerability Details
4OSVCVE-2025-24528: In MIT Kerberos 5 (aka krb5) before 1↗2026-01-16 ▶ GHSAGHSA-wrjh-fhfj-xhfm: In MIT Kerberos 5 (aka krb5) before 1↗2026-01-16 ▶ CVEListCVE-2025-24528: In MIT Kerberos 5 (aka krb5) before 1↗2026-01-16 ▶ OSVkrb5 vulnerabilities↗2025-03-03 ▶ 📋Vendor Advisories
3UbuntuKerberos vulnerabilities↗2025-03-03 ▶ DebianCVE-2025-24528: krb5 - In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there i...↗2025 ▶ Red Hatkrb5: overflow when calculating ulog block size↗2024-01-28 ▶ 🕵️Threat Intelligence
1WizCVE-2025-24528 Impact, Exploitability, and Mitigation Steps | Wiz↗ ▶