CVE-2015-8630
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
Las funciones (1) kadm5_create_principal_3 y (2) kadm5_modify_principal en lib/kadm5/srv/svr_principal.c en kadmind en MIT Kerberos 5 (también conocido como krb5) 1.12.x y 1.13.x en versiones anteriores a 1.13.4 y 1.14.x en versiones anteriores a 1.14.1 permiten a usuarios remotos autenticados causar una denegación de servicio (referencia a puntero NULL y caída de demonio) mediante la especificación KADM5_POLICY con un nombre de política NULL.
A NULL pointer dereference flaw was found in the procedure used by the MIT Kerberos kadmind service to store policies: the kadm5_create_principal_3() and kadm5_modify_principal() function did not ensure that a policy was given when KADM5_POLICY was set. An authenticated attacker with permissions to modify the database could use this flaw to add or modify a principal with a policy set to NULL, causing the kadmind service to crash.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-23 CVE Reserved
- 2016-02-05 CVE Published
- 2023-05-15 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342 | X_refsource_confirm | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | X_refsource_confirm | |
http://www.securitytracker.com/id/1034915 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b | 2020-01-21 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html | 2020-01-21 | |
http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html | 2020-01-21 | |
http://rhn.redhat.com/errata/RHSA-2016-0532.html | 2020-01-21 | |
http://www.debian.org/security/2016/dsa-3466 | 2020-01-21 | |
https://access.redhat.com/security/cve/CVE-2015-8630 | 2016-03-31 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1302632 | 2016-03-31 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.12 Search vendor "Mit" for product "Kerberos 5" and version "1.12" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.12.1 Search vendor "Mit" for product "Kerberos 5" and version "1.12.1" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.12.2 Search vendor "Mit" for product "Kerberos 5" and version "1.12.2" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.12.3 Search vendor "Mit" for product "Kerberos 5" and version "1.12.3" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.12.4 Search vendor "Mit" for product "Kerberos 5" and version "1.12.4" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.12.5 Search vendor "Mit" for product "Kerberos 5" and version "1.12.5" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.13 Search vendor "Mit" for product "Kerberos 5" and version "1.13" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.13.1 Search vendor "Mit" for product "Kerberos 5" and version "1.13.1" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.13.2 Search vendor "Mit" for product "Kerberos 5" and version "1.13.2" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.13.3 Search vendor "Mit" for product "Kerberos 5" and version "1.13.3" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.14 Search vendor "Mit" for product "Kerberos 5" and version "1.14" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.14 Search vendor "Mit" for product "Kerberos 5" and version "1.14" | alpha1 |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.14 Search vendor "Mit" for product "Kerberos 5" and version "1.14" | beta1 |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | 1.14 Search vendor "Mit" for product "Kerberos 5" and version "1.14" | beta2 |
Affected
|