Lucene search

K
freebsdFreeBSDA6986F0F-3AC0-11EE-9A88-206A8A720317
HistoryAug 07, 2023 - 12:00 a.m.

krb5 -- Double-free in KDC TGS processing

2023-08-0700:00:00
vuxml.freebsd.org
10
krb5
kdc
tgs
vulnerability
double-free
processing
renew
validate
ticket
enc_part
aliasing
authdata
unix

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

41.4%

SO-AND-SO reports:

When issuing a ticket for a TGS renew or validate request, copy
only the server field from the outer part of the header ticket
to the new ticket. Copying the whole structure causes the
enc_part pointer to be aliased to the header ticket until
krb5_encrypt_tkt_part() is called, resulting in a double-free
if handle_authdata() fails…

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchkrb5< 1.21.1_1UNKNOWN
FreeBSDanynoarchkrb5-121< 1.21.1_1UNKNOWN
FreeBSDanynoarchkrb5-devel< 1.22.2023.08.07UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

41.4%