CVE-2016-3119
high-risk
Published 2016-03-26
The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
Do I need to act?
~
9.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ HIGH complexity
Affected Products (20)
References (14)
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
Third Party Advisory
http://www.securityfocus.com/bid/85392
Third Party Advisory
http://www.securitytracker.com/id/1035399
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
Third Party Advisory
http://www.securityfocus.com/bid/85392
Third Party Advisory
http://www.securitytracker.com/id/1035399
55
/ 100
high-risk
Severity
17/34 · Moderate
Exploitability
10/34 · Low
Exposure
28/34 · Critical