NULL Pointer Dereference Affecting krb5-pkinit package, versions <0:1.12.2-14.el7


medium

Snyk CVSS

    Attack Complexity Low
    User Interaction Required
Expand this section
NVD
3.5 low
Expand this section
Red Hat
3.5 low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-ORACLE7-KRB5PKINIT-2489634
  • published 10 Apr 2022
  • disclosed 16 Dec 2014

How to fix?

Upgrade Oracle:7 krb5-pkinit to version 0:1.12.2-14.el7 or higher.
This issue was patched in ELSA-2015-0439.

NVD Description

Note: Versions mentioned in the description apply only to the upstream krb5-pkinit package and not the krb5-pkinit package as distributed by Oracle:7. See How to fix? for Oracle:7 relevant fixed versions and status.

The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.