Vulnerability Details : CVE-2016-3120
The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2016-3120
- cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-3120
4.89%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-3120
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2016-3120
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-3120
-
http://rhn.redhat.com/errata/RHSA-2016-2591.html
RHSA-2016:2591 - Security Advisory - Red Hat Customer Portal
-
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
#8458: Fix S4U2Self KDC crash when anon is restricted [CVE-2016-3120]Issue Tracking
-
https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7
Fix S4U2Self KDC crash when anon is restricted · krb5/krb5@93b4a63 · GitHub
-
http://www.securitytracker.com/id/1036442
Kerberos KDC Null Pointer Dereference in validate_as_request() Lets Remote Authenticated Users Deny Service - SecurityTracker
-
http://www.securityfocus.com/bid/92132
MIT Kerberos KDC CVE-2016-3120 NULL Pointer Dereference Denial Of Service Vulnerability
-
http://web.mit.edu/kerberos/krb5-1.14/
Kerberos 5 Release 1.14.6
-
http://web.mit.edu/kerberos/krb5-1.13/
Kerberos 5 Release 1.13.7
-
http://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html
openSUSE-SU-2016:2268-1: moderate: Security update for krb5
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/
[SECURITY] Fedora 24 Update: krb5-1.14.1-8.fc24 - package-announce - Fedora Mailing-Lists
-
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
[SECURITY] [DLA 1265-1] krb5 security update
Jump to