A flaw was found in, Fedora versions of krb5 from 1.16.1 to, including 1.17.x, in the way a Kerberos client could crash the KDC by sending one of the RFC 4556 enctypes. A remote unauthenticated user could use this flaw to crash the KDC.
The product calls a function, procedure, or routine with arguments that are not correctly specified, leading to always-incorrect behavior and resultant weaknesses.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kerberos_5 | Mit | 1.16.1 (including) | 1.17.1 (including) |
Krb5 | Ubuntu | trusty | * |
There are multiple ways in which this weakness can be introduced, including: