CVE-2015-8629
moderate-risk
Published 2016-02-13
The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
Do I need to act?
~
1.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ HIGH complexity
Affected Products (20)
References (22)
Vendor Advisory
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0493.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0532.html
Third Party Advisory
http://www.debian.org/security/2016/dsa-3466
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.h...
Third Party Advisory
http://www.securityfocus.com/bid/82801
Third Party Advisory
http://www.securitytracker.com/id/1034914
Vendor Advisory
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0493.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0532.html
Third Party Advisory
http://www.debian.org/security/2016/dsa-3466
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.h...
Third Party Advisory
http://www.securityfocus.com/bid/82801
and 2 more references
44
/ 100
moderate-risk
Severity
17/34 · Moderate
Exploitability
4/34 · Minimal
Exposure
23/34 · High