CVE-2017-17439

NameCVE-2017-17439
DescriptionIn Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the _kdc_as_rep function in kdc/kerberos5.c and the der_length_visible_string function in lib/asn1/der_length.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4055-1
Debian Bugs878144

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
heimdal (PTS)buster7.5.0+dfsg-3fixed
buster (security)7.5.0+dfsg-3+deb10u2fixed
bullseye (security), bullseye7.7.0+dfsg-2+deb11u3fixed
bookworm7.8.git20221117.28daf24+dfsg-2fixed
trixie7.8.git20221117.28daf24+dfsg-4fixed
sid7.8.git20221117.28daf24+dfsg-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
heimdalsourcewheezy(not affected)
heimdalsourcejessie(not affected)
heimdalsourcestretch7.1.0+dfsg-13+deb9u2DSA-4055-1
heimdalsource(unstable)7.5.0+dfsg-1878144

Notes

[jessie] - heimdal <not-affected> (Vulnerability introduced in 7.0)
[wheezy] - heimdal <not-affected> (Vulnerability introduced in 7.0)
https://github.com/heimdal/heimdal/issues/353
Fixed by: https://github.com/heimdal/heimdal/commit/749d377fa357351a7bbba51f8aae72cdf0629592 (7.1)
Fixed by: https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887 (master)

Search for package or bug name: Reporting problems