vulnerability
SUSE: CVE-2017-17439: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Dec 6, 2017 | Dec 12, 2017 | Jan 26, 2018 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Dec 6, 2017
Added
Dec 12, 2017
Modified
Jan 26, 2018
Description
In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c.
Solutions
suse-upgrade-libheimdalsuse-upgrade-libheimdal-debuginfosuse-upgrade-libheimdal-debugsourcesuse-upgrade-libheimdal-devel
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.