vulnerability

FreeBSD: VID-3f3837cc-48fb-4414-aa46-5b1c23c9feae (CVE-2017-11462): krb5 -- Multiple vulnerabilities

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Oct 18, 2017
Added
Oct 18, 2017
Modified
Dec 10, 2025

Description

MIT reports: CVE-2017-11368: In MIT krb5 1.7 and later, an authenticated attacker can cause an assertion failure in krb5kdc by sending an invalid S4U2Self or S4U2Proxy request. CVE-2017-11462: RFC 2744 permits a GSS-API implementation to delete an existing security context on a second or subsequent call to gss_init_sec_context() or gss_accept_sec_context() if the call results in an error. This API behavior has been found to be dangerous, leading to the possibility of memory errors in some callers. For safety, GSS-API implementations should instead preserve existing security contexts on error until the caller deletes them. All versions of MIT krb5 prior to this change may delete acceptor contexts on error. Versions 1.13.4 through 1.13.7, 1.14.1 through 1.14.5, and 1.15 through 1.15.1 may also delete initiator contexts on error.

Solutions

freebsd-upgrade-package-krb5freebsd-upgrade-package-krb5-develfreebsd-upgrade-package-krb5-115freebsd-upgrade-package-krb5-114freebsd-upgrade-package-krb5-113
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.