A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.
[
{
"digest": {
"function_hash": "281632458950095218231934864773643278513",
"length": 2237.0
},
"target": {
"file": "src/kdc/kdc_util.c",
"function": "kdc_process_s4u2self_req"
},
"signature_type": "Function",
"signature_version": "v1",
"source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086",
"id": "CVE-2018-20217-2b9be4ce",
"deprecated": false
},
{
"digest": {
"function_hash": "22009747526011531247411191432701765815",
"length": 1519.0
},
"target": {
"file": "src/lib/krb5/krb/s4u_creds.c",
"function": "s4u_identify_user"
},
"signature_type": "Function",
"signature_version": "v1",
"source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086",
"id": "CVE-2018-20217-9deb1157",
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"275169878082459207433134400309769904522",
"325437437607260974550496749957866301197",
"211459628144645672959958375863273568099"
]
},
"target": {
"file": "src/kdc/kdc_util.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086",
"id": "CVE-2018-20217-b4599e87",
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"128921040204504305593903249595158023063",
"204304021945698355911099436541501299156",
"253680059342113239776293698208297650928",
"35772295698068732454334995534124366979"
]
},
"target": {
"file": "src/lib/krb5/krb/s4u_creds.c"
},
"signature_type": "Line",
"signature_version": "v1",
"source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086",
"id": "CVE-2018-20217-e4d34f09",
"deprecated": false
}
]