The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2591.html - | |
References | () http://www.securityfocus.com/bid/85392 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1035399 - Third Party Advisory, VDB Entry | |
References | () https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html - |
Information
Published : 2016-03-26 01:59
Updated : 2024-11-21 02:49
NVD link : CVE-2016-3119
Mitre link : CVE-2016-3119
CVE.ORG link : CVE-2016-3119
JSON object : View
Products Affected
opensuse
- leap
- opensuse
mit
- kerberos_5
CWE