CVE-2016-3119

LOW

Description

The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.

References

http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html

http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html

http://rhn.redhat.com/errata/RHSA-2016-2591.html

http://www.securityfocus.com/bid/85392

http://www.securitytracker.com/id/1035399

https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99

https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html

Details

Source: MITRE

Published: 2016-03-26

Updated: 2020-01-21

Risk Information

CVSS v2.0

Base Score: 3.5

Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 6.8

Severity: LOW

CVSS v3.0

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.2.8:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.3.5:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.3.6:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.4.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.4.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.5:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.6:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.6.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.6.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14.0:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
119067EulerOS Virtualization 2.5.1 : krb5 (EulerOS-SA-2018-1376)NessusHuawei Local Security Checks
low
106536Debian DLA-1265-1 : krb5 security updateNessusDebian Local Security Checks
medium
99836EulerOS 2.0 SP1 : krb5 (EulerOS-SA-2016-1076)NessusHuawei Local Security Checks
medium
97023Amazon Linux AMI : krb5 (ALAS-2017-793)NessusAmazon Linux Local Security Checks
medium
95842Scientific Linux Security Update : krb5 on SL7.x x86_64 (20161103)NessusScientific Linux Local Security Checks
medium
95337CentOS 7 : krb5 (CESA-2016:2591)NessusCentOS Local Security Checks
medium
94712Oracle Linux 7 : krb5 (ELSA-2016-2591)NessusOracle Linux Local Security Checks
medium
94554RHEL 7 : krb5 (RHSA-2016:2591)NessusRed Hat Local Security Checks
medium
90586SUSE SLES11 Security Update : krb5 (SUSE-SU-2016:1088-1)NessusSuSE Local Security Checks
low
90564openSUSE Security Update : krb5 (openSUSE-2016-474)NessusSuSE Local Security Checks
low
90506SUSE SLED12 / SLES12 Security Update : krb5 (SUSE-SU-2016:0994-1)NessusSuSE Local Security Checks
low
90341openSUSE Security Update : krb5 (openSUSE-2016-424)NessusSuSE Local Security Checks
low