CVE-2016-3120
moderate-risk
Published 2016-08-01
The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
Do I need to act?
~
3.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (10)
Affected Vendors
References (20)
Issue Tracking
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
Issue Tracking
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8458
47
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
7/34 · Low
Exposure
16/34 · Moderate