CVE Vulnerabilities

CVE-2016-3120

NULL Pointer Dereference

Published: Aug 01, 2016 | Modified: Apr 12, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
3.5 LOW
AV:N/AC:M/Au:S/C:N/I:N/A:P
RedHat/V3
5.3 LOW
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Kerberos_5Mit1.13 (including)1.13 (including)
Kerberos_5Mit1.13.1 (including)1.13.1 (including)
Kerberos_5Mit1.13.2 (including)1.13.2 (including)
Kerberos_5Mit1.13.3 (including)1.13.3 (including)
Kerberos_5Mit1.13.4 (including)1.13.4 (including)
Kerberos_5Mit1.13.5 (including)1.13.5 (including)
Kerberos_5Mit1.13.6 (including)1.13.6 (including)
Kerberos_5Mit1.14 (including)1.14 (including)
Kerberos_5Mit1.14.1 (including)1.14.1 (including)
Kerberos_5Mit1.14.2 (including)1.14.2 (including)
Red Hat Enterprise Linux 7RedHatkrb5-0:1.14.1-26.el7*
Krb5Ubuntuesm-infra-legacy/trusty*
Krb5Ubuntuesm-infra/xenial*
Krb5Ubuntuprecise*
Krb5Ubuntuprecise/esm*
Krb5Ubuntutrusty*
Krb5Ubuntutrusty/esm*
Krb5Ubuntuupstream*
Krb5Ubuntuvivid/stable-phone-overlay*
Krb5Ubuntuvivid/ubuntu-core*
Krb5Ubuntuwily*
Krb5Ubuntuxenial*

Potential Mitigations

References