In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
{ "vanir_signatures": [ { "digest": { "function_hash": "330028959243753203609613709933773874074", "length": 653.0 }, "id": "CVE-2017-11368-16ce6abc", "source": "https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970", "signature_version": "v1", "signature_type": "Function", "target": { "file": "src/kdc/kdc_util.c", "function": "kdc_process_s4u2proxy_req" }, "deprecated": false }, { "digest": { "function_hash": "83240240999769545177314307306634696539", "length": 15624.0 }, "id": "CVE-2017-11368-5bf800eb", "source": "https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970", "signature_version": "v1", "signature_type": "Function", "target": { "file": "src/kdc/do_tgs_req.c", "function": "process_tgs_req" }, "deprecated": false }, { "digest": { "function_hash": "156221043922931185817485653085623573900", "length": 673.0 }, "id": "CVE-2017-11368-755de4b8", "source": "https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970", "signature_version": "v1", "signature_type": "Function", "target": { "file": "src/kdc/kdc_util.c", "function": "kdc_process_for_user" }, "deprecated": false }, { "digest": { "threshold": 0.9, "line_hashes": [ "283975676019297401139999035662419444645", "282672820768443496025395926450658577906", "47215875968588905788377893875480578522", "91415356043600347659629545620442554514", "99052052106133597793956133896851414116", "184992862356724350174483412619012981443", "180808050400054218726783860965016757985", "298778936289824725957268107039822507847", "73155155861381541010112379124029782245", "99432362990357885032626879684404162822", "218227452749620134082433343964277257909", "114506724569938914743330379561712543200", "37246406000188172841916433720272670724", "78014914416155917900049677080906534854", "272232022684417892734841124247077554087", "298769036358435233077422396747719161328", "129707705023951043827643630971048549541", "70541791018619243244654308933730348437" ] }, "id": "CVE-2017-11368-a6179004", "source": "https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970", "signature_version": "v1", "signature_type": "Line", "target": { "file": "src/kdc/kdc_util.c" }, "deprecated": false }, { "digest": { "function_hash": "74531147696732265420744333821386430488", "length": 771.0 }, "id": "CVE-2017-11368-ae10ded1", "source": "https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970", "signature_version": "v1", "signature_type": "Function", "target": { "file": "src/kdc/kdc_util.c", "function": "kdc_process_s4u_x509_user" }, "deprecated": false }, { "digest": { "threshold": 0.9, "line_hashes": [ "325367889476803086856633468511928700848", "68989466184981042379603439399162329417", "173256510690270124507023254971734967536", "115082524213724777578031700444571321986" ] }, "id": "CVE-2017-11368-ca597638", "source": "https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970", "signature_version": "v1", "signature_type": "Line", "target": { "file": "src/kdc/do_tgs_req.c" }, "deprecated": false }, { "digest": { "threshold": 0.9, "line_hashes": [ "311703179622825782984481815100440141886", "256372248361650419130344277581095724040", "89102105830819084952166022460426190619", "108192380190004863950675277511866253291", "44123480385076308243782818462219067811" ] }, "id": "CVE-2017-11368-ea438f50", "source": "https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970", "signature_version": "v1", "signature_type": "Line", "target": { "file": "src/kdc/do_as_req.c" }, "deprecated": false }, { "digest": { "function_hash": "176621686112374436775066263314571356236", "length": 7164.0 }, "id": "CVE-2017-11368-fcaca95d", "source": "https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970", "signature_version": "v1", "signature_type": "Function", "target": { "file": "src/kdc/do_as_req.c", "function": "finish_process_as_req" }, "deprecated": false } ] }