vulnerability
Oracle Linux: CVE-2021-36222: ELSA-2021-3576: krb5 security update (MODERATE)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Jul 12, 2021 | Sep 23, 2021 | Dec 3, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jul 12, 2021
Added
Sep 23, 2021
Modified
Dec 3, 2025
Description
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.
A flaw was found in krb5. This flaw allows an unauthenticated attacker to cause a NULL dereference in the KDC by sending a request containing a PA-ENCRYPTED-CHALLENGE padata element without using FAST. The highest threat from this vulnerability is to system availability.
A flaw was found in krb5. This flaw allows an unauthenticated attacker to cause a NULL dereference in the KDC by sending a request containing a PA-ENCRYPTED-CHALLENGE padata element without using FAST. The highest threat from this vulnerability is to system availability.
Solutions
oracle-linux-upgrade-krb5-develoracle-linux-upgrade-krb5-libsoracle-linux-upgrade-krb5-pkinitoracle-linux-upgrade-krb5-serveroracle-linux-upgrade-krb5-server-ldaporacle-linux-upgrade-krb5-workstationoracle-linux-upgrade-libkadm5
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.