Vulnerability Details CVE-2017-15088
plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.014
EPSS Ranking 79.1%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2017-15088
-
cpe:2.3:a:mit:kerberos_5:-
-
cpe:2.3:a:mit:kerberos_5:1.0
-
cpe:2.3:a:mit:kerberos_5:1.0.3
-
cpe:2.3:a:mit:kerberos_5:1.0.4
-
cpe:2.3:a:mit:kerberos_5:1.0.5
-
cpe:2.3:a:mit:kerberos_5:1.0.6
-
cpe:2.3:a:mit:kerberos_5:1.0.7
-
cpe:2.3:a:mit:kerberos_5:1.1
-
cpe:2.3:a:mit:kerberos_5:1.1.1
-
cpe:2.3:a:mit:kerberos_5:1.10
-
cpe:2.3:a:mit:kerberos_5:1.10.1
-
cpe:2.3:a:mit:kerberos_5:1.10.2
-
cpe:2.3:a:mit:kerberos_5:1.10.3
-
cpe:2.3:a:mit:kerberos_5:1.10.4
-
cpe:2.3:a:mit:kerberos_5:1.10.5
-
cpe:2.3:a:mit:kerberos_5:1.10.6
-
cpe:2.3:a:mit:kerberos_5:1.10.7
-
cpe:2.3:a:mit:kerberos_5:1.11
-
cpe:2.3:a:mit:kerberos_5:1.11.1
-
cpe:2.3:a:mit:kerberos_5:1.11.2
-
cpe:2.3:a:mit:kerberos_5:1.11.3
-
cpe:2.3:a:mit:kerberos_5:1.11.4
-
cpe:2.3:a:mit:kerberos_5:1.11.5
-
cpe:2.3:a:mit:kerberos_5:1.11.6
-
cpe:2.3:a:mit:kerberos_5:1.12
-
cpe:2.3:a:mit:kerberos_5:1.12.1
-
cpe:2.3:a:mit:kerberos_5:1.12.2
-
cpe:2.3:a:mit:kerberos_5:1.12.3
-
cpe:2.3:a:mit:kerberos_5:1.12.4
-
cpe:2.3:a:mit:kerberos_5:1.12.5
-
cpe:2.3:a:mit:kerberos_5:1.13
-
cpe:2.3:a:mit:kerberos_5:1.13.1
-
cpe:2.3:a:mit:kerberos_5:1.13.2
-
cpe:2.3:a:mit:kerberos_5:1.13.3
-
cpe:2.3:a:mit:kerberos_5:1.13.4
-
cpe:2.3:a:mit:kerberos_5:1.13.5
-
cpe:2.3:a:mit:kerberos_5:1.13.6
-
cpe:2.3:a:mit:kerberos_5:1.13.7
-
cpe:2.3:a:mit:kerberos_5:1.14
-
cpe:2.3:a:mit:kerberos_5:1.14.0
-
cpe:2.3:a:mit:kerberos_5:1.14.1
-
cpe:2.3:a:mit:kerberos_5:1.14.2
-
cpe:2.3:a:mit:kerberos_5:1.14.3
-
cpe:2.3:a:mit:kerberos_5:1.14.4
-
cpe:2.3:a:mit:kerberos_5:1.14.5
-
cpe:2.3:a:mit:kerberos_5:1.14.6
-
cpe:2.3:a:mit:kerberos_5:1.15
-
cpe:2.3:a:mit:kerberos_5:1.15.1
-
cpe:2.3:a:mit:kerberos_5:1.15.2
-
cpe:2.3:a:mit:kerberos_5:1.2
-
cpe:2.3:a:mit:kerberos_5:1.2.1
-
cpe:2.3:a:mit:kerberos_5:1.2.2
-
cpe:2.3:a:mit:kerberos_5:1.2.3
-
cpe:2.3:a:mit:kerberos_5:1.2.4
-
cpe:2.3:a:mit:kerberos_5:1.2.5
-
cpe:2.3:a:mit:kerberos_5:1.2.6
-
cpe:2.3:a:mit:kerberos_5:1.2.7
-
cpe:2.3:a:mit:kerberos_5:1.2.8
-
cpe:2.3:a:mit:kerberos_5:1.3
-
cpe:2.3:a:mit:kerberos_5:1.3.1
-
cpe:2.3:a:mit:kerberos_5:1.3.2
-
cpe:2.3:a:mit:kerberos_5:1.3.3
-
cpe:2.3:a:mit:kerberos_5:1.3.4
-
cpe:2.3:a:mit:kerberos_5:1.3.5
-
cpe:2.3:a:mit:kerberos_5:1.3.6
-
cpe:2.3:a:mit:kerberos_5:1.4
-
cpe:2.3:a:mit:kerberos_5:1.4.1
-
cpe:2.3:a:mit:kerberos_5:1.4.2
-
cpe:2.3:a:mit:kerberos_5:1.4.3
-
cpe:2.3:a:mit:kerberos_5:1.4.4
-
cpe:2.3:a:mit:kerberos_5:1.5
-
cpe:2.3:a:mit:kerberos_5:1.5.1
-
cpe:2.3:a:mit:kerberos_5:1.5.2
-
cpe:2.3:a:mit:kerberos_5:1.5.3
-
cpe:2.3:a:mit:kerberos_5:1.5.4
-
cpe:2.3:a:mit:kerberos_5:1.6
-
cpe:2.3:a:mit:kerberos_5:1.6.1
-
cpe:2.3:a:mit:kerberos_5:1.6.2
-
cpe:2.3:a:mit:kerberos_5:1.6.3
-
cpe:2.3:a:mit:kerberos_5:1.7
-
cpe:2.3:a:mit:kerberos_5:1.7.1
-
cpe:2.3:a:mit:kerberos_5:1.7.2
-
cpe:2.3:a:mit:kerberos_5:1.8
-
cpe:2.3:a:mit:kerberos_5:1.8.1
-
cpe:2.3:a:mit:kerberos_5:1.8.2
-
cpe:2.3:a:mit:kerberos_5:1.8.3
-
cpe:2.3:a:mit:kerberos_5:1.8.4
-
cpe:2.3:a:mit:kerberos_5:1.8.5
-
cpe:2.3:a:mit:kerberos_5:1.8.6
-
cpe:2.3:a:mit:kerberos_5:1.9
-
cpe:2.3:a:mit:kerberos_5:1.9.1
-
cpe:2.3:a:mit:kerberos_5:1.9.2
-
cpe:2.3:a:mit:kerberos_5:1.9.3
-
cpe:2.3:a:mit:kerberos_5:1.9.4
-
cpe:2.3:a:mit:kerberos_5:1.9.5