Your submission was sent successfully! Close

CVE-2017-17439

Published: 06 December 2017

In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
heimdal
Launchpad, Ubuntu, Debian
Upstream
Released (7.5.0+dfsg-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(7.5.0+dfsg-1)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(code not present)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(code not present)
Patches:
Upstream: https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887
Binaries built from this source package are in Universe and so are supported by the community.