Description
In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c.
Published: 2017-12-06
Score: 7.5 High
EPSS: 4.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-4055-1 heimdal security update
EUVD EUVD EUVD-2017-8603 In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c.
History

No history.

Subscriptions

Debian Debian Linux
Heimdal Project Heimdal
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:51:31.511Z

Reserved: 2017-12-06T00:00:00.000Z

Link: CVE-2017-17439

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-12-06T15:29:00.250

Modified: 2026-05-13T00:24:29.033

Link: CVE-2017-17439

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses