Vulnerability Details : CVE-2017-11368
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
Products affected by CVE-2017-11368
- cpe:2.3:a:mit:kerberos:5-1.13.7:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-11368
0.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-11368
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2017-11368
-
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-11368
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/
[SECURITY] Fedora 26 Update: krb5-1.15.1-17.fc26 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970
Prevent KDC unset status assertion failures · krb5/krb5@ffb35ba · GitHubPatch;Third Party Advisory
-
http://www.securityfocus.com/bid/100291
MIT Kerberos 5 CVE-2017-11368 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2018:0666
RHSA-2018:0666 - Security Advisory - Red Hat Customer Portal
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/
[SECURITY] Fedora 25 Update: krb5-1.14.4-8.fc25 - package-announce - Fedora Mailing-ListsThird Party Advisory
Jump to