6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.048 Low
EPSS
Percentile
91.7%
Kerberos is a networked authentication system which allows clients and
servers to authenticate to each other with the help of a trusted third
party, the Kerberos KDC.
A memory leak flaw was found in the krb5_unparse_name() function of the MIT
Kerberos kadmind service. An authenticated attacker could repeatedly send
specially crafted requests to the server, which could cause the server to
consume large amounts of memory resources, ultimately leading to a denial
of service due to memory exhaustion. (CVE-2015-8631)
An out-of-bounds read flaw was found in the kadmind service of MIT
Kerberos. An authenticated attacker could send a maliciously crafted
message to force kadmind to read beyond the end of allocated memory, and
write the memory contents to the KDC database if the attacker has write
permission, leading to information disclosure. (CVE-2015-8629)
The CVE-2015-8631 issue was discovered by Simo Sorce of Red Hat.
All krb5 users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
updated packages, running Kerberos services (krb5kdc, kadmin, and kprop)
will be restarted automatically.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | ppc64 | krb5-libs | < 1.10.3-42z1.el6_7 | krb5-libs-1.10.3-42z1.el6_7.ppc64.rpm |
RedHat | 6 | s390 | krb5-debuginfo | < 1.10.3-42z1.el6_7 | krb5-debuginfo-1.10.3-42z1.el6_7.s390.rpm |
RedHat | 6 | x86_64 | krb5-debuginfo | < 1.10.3-42z1.el6_7 | krb5-debuginfo-1.10.3-42z1.el6_7.x86_64.rpm |
RedHat | 6 | i686 | krb5-devel | < 1.10.3-42z1.el6_7 | krb5-devel-1.10.3-42z1.el6_7.i686.rpm |
RedHat | 6 | ppc64 | krb5-devel | < 1.10.3-42z1.el6_7 | krb5-devel-1.10.3-42z1.el6_7.ppc64.rpm |
RedHat | 6 | s390 | krb5-libs | < 1.10.3-42z1.el6_7 | krb5-libs-1.10.3-42z1.el6_7.s390.rpm |
RedHat | 6 | x86_64 | krb5-pkinit-openssl | < 1.10.3-42z1.el6_7 | krb5-pkinit-openssl-1.10.3-42z1.el6_7.x86_64.rpm |
RedHat | 6 | s390x | krb5-libs | < 1.10.3-42z1.el6_7 | krb5-libs-1.10.3-42z1.el6_7.s390x.rpm |
RedHat | 6 | s390x | krb5-debuginfo | < 1.10.3-42z1.el6_7 | krb5-debuginfo-1.10.3-42z1.el6_7.s390x.rpm |
RedHat | 6 | s390x | krb5-server | < 1.10.3-42z1.el6_7 | krb5-server-1.10.3-42z1.el6_7.s390x.rpm |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.048 Low
EPSS
Percentile
91.7%