ID CVE-2017-17439
Summary In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c.
References
Vulnerable Configurations
CVSS
Base: None
Impact:
Exploitability:
nessus via4
NASL family Debian Local Security Checks
NASL id DEBIAN_DSA-4055.NASL
description Michael Eder and Thomas Kittel discovered that Heimdal, an implementation of Kerberos 5 that aims to be compatible with MIT Kerberos, did not correctly handle ASN.1 data. This would allow an unauthenticated remote attacker to cause a denial of service (crash of the KDC daemon) by sending maliciously crafted packets.
last seen 2017-12-09
modified 2017-12-08
plugin id 105087
published 2017-12-08
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=105087
title Debian DSA-4055-1 : heimdal - security update
refmap via4
confirm
debian DSA-4055
misc http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html
Last major update 06-12-2017 - 10:29
Published 06-12-2017 - 10:29
Last modified 08-12-2017 - 21:29
Back to Top