CVE-2017-11368

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.

References

http://www.securityfocus.com/bid/100291

https://access.redhat.com/errata/RHSA-2018:0666

https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970

https://lists.fedoraproject.org/archives/list/[email protected]/message/4HNWXM6OQU7G23MG7XWIOBRGP43ECLDT/

https://lists.fedoraproject.org/archives/list/[email protected]/message/UBUTXMNZWMVJLQ4NDX5OQFPUVCJRLV3W/

Details

Source: MITRE

Published: 2017-08-09

Updated: 2020-01-21

Type: CWE-617

Risk Information

CVSS v2

Base Score: 4

Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8

Severity: MEDIUM

CVSS v3

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 2.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:mit:kerberos:5-1.13.7:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.7:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.7.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.5:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.8.6:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.9.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.10.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.11.5:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.12:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.12.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.12.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.12.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13.5:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.13.6:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14:alpha1:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14:beta1:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14:beta2:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14.2:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14.3:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14.4:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.14.5:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.15:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.15.1:*:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.15.1:beta1:*:*:*:*:*:*

cpe:2.3:a:mit:kerberos_5:1.15.1:beta2:*:*:*:*:*:*

Tenable Plugins

View all (16 total)

IDNameProductFamilySeverity
127186NewStart CGSL CORE 5.04 / MAIN 5.04 : krb5 Multiple Vulnerabilities (NS-SA-2019-0025)NessusNewStart CGSL Local Security Checks
medium
123853EulerOS Virtualization 2.5.3 : krb5 (EulerOS-SA-2019-1167)NessusHuawei Local Security Checks
medium
119897EulerOS Virtualization 2.5.2 : krb5 (EulerOS-SA-2018-1408)NessusHuawei Local Security Checks
medium
118755EulerOS 2.0 SP3 : krb5 (EulerOS-SA-2018-1361)NessusHuawei Local Security Checks
medium
118737EulerOS 2.0 SP2 : krb5 (EulerOS-SA-2018-1354)NessusHuawei Local Security Checks
medium
117342Amazon Linux AMI : krb5 (ALAS-2018-1010)NessusAmazon Linux Local Security Checks
medium
109689Amazon Linux 2 : krb5 (ALAS-2018-1010)NessusAmazon Linux Local Security Checks
medium
109450Scientific Linux Security Update : krb5 on SL7.x x86_64 (20180410)NessusScientific Linux Local Security Checks
medium
109370CentOS 7 : krb5 (CESA-2018:0666)NessusCentOS Local Security Checks
medium
109104Oracle Linux 7 : krb5 (ELSA-2018-0666)NessusOracle Linux Local Security Checks
medium
108983RHEL 7 : krb5 (RHSA-2018:0666)NessusRed Hat Local Security Checks
medium
103953FreeBSD : krb5 -- Multiple vulnerabilities (3f3837cc-48fb-4414-aa46-5b1c23c9feae)NessusFreeBSD Local Security Checks
critical
102482Debian DLA-1058-1 : krb5 security updateNessusDebian Local Security Checks
medium
102002Fedora 25 : krb5 (2017-8e9d9771c4)NessusFedora Local Security Checks
medium
101997Fedora 24 : krb5 (2017-71c47e1e82)NessusFedora Local Security Checks
medium
101965Fedora 26 : krb5 (2017-e5b36383f4)NessusFedora Local Security Checks
medium