lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2015-11-08 19:59
Updated : 2021-02-02 11:05
NVD link : CVE-2015-2695
Mitre link : CVE-2015-2695
JSON object : View
CWE
CWE-763
Release of Invalid Pointer or Reference
Products Affected
suse
- linux_enterprise_desktop
- linux_enterprise_software_development_kit
- linux_enterprise_server
canonical
- ubuntu_linux
opensuse
- leap
- opensuse
debian
- debian_linux
mit
- kerberos_5
oracle
- solaris