Missing Release of Resource after Effective Lifetime Affecting krb5 package, versions <1.13.2+dfsg-5
Snyk CVSS
Attack Complexity
Low
Availability
High
Threat Intelligence
EPSS
6.4% (94th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-KRB5-395770
- published 13 Feb 2016
- disclosed 13 Feb 2016
Introduced: 13 Feb 2016
CVE-2015-8631 Open this link in a new tabHow to fix?
Upgrade Debian:9
krb5
to version 1.13.2+dfsg-5 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream krb5
package and not the krb5
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
References
- https://security-tracker.debian.org/tracker/CVE-2015-8631
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631
- http://www.debian.org/security/2016/dsa-3466
- https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://rhn.redhat.com/errata/RHSA-2016-0493.html
- http://rhn.redhat.com/errata/RHSA-2016-0532.html
- http://www.securitytracker.com/id/1034916
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8631