plugins/preauth/pkinit/pkinitcryptoopenssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the getmatchingdata and X509NAMEonelineex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of getmatching_data in KDC certauth plugin code that is specific to Red Hat.
[
{
"id": "CVE-2017-15088-0bbe7661",
"deprecated": false,
"digest": {
"function_hash": "319056387699767631926726914969734411257",
"length": 461.0
},
"signature_type": "Function",
"source": "https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4",
"signature_version": "v1",
"target": {
"file": "src/plugins/preauth/pkinit/pkinit_crypto_openssl.c",
"function": "X509_NAME_oneline_ex"
}
},
{
"id": "CVE-2017-15088-403776f7",
"deprecated": false,
"digest": {
"line_hashes": [
"279292813219746823677532824714218872323",
"217432453232397824978848157812379024368",
"119574223050316908539911420666720073950",
"183973212326717697863403440342551057940",
"66645707007354709630552218460901125348",
"97580563659190393370090612467161351977",
"12396520658741259575630900013970077531",
"104188435860651642774034395790333545957",
"121259980145935057902347539570000398038",
"52154987490860817268654532722753888760",
"6022096577875113642843530069954696558",
"200151014062051406045106902672288331866",
"119377450856674769030282981012203560724",
"149659764186472576570254343928344519020",
"131332746661157213836899878514307163630",
"87175253143964962761067964979816920387",
"99168924437238917432768983530711910483",
"190514094055831093294990264092044239942",
"224267047642386850990322236024090859661",
"99386848099307025553614398347969553667",
"42022065828970131235532434712775577951",
"78665054144780781925327514358981613412",
"69073023158311737696735031676335744188",
"89710413463912125817533208216805794900",
"138518148784896151289832497557417112998",
"183248215839116588960355176593480272968",
"331048256505064657749198070881374120796",
"227943242168469061897241941238536104464",
"211688238444337902509590690614539666973",
"38842525064467757614143210130200320924",
"35007492642268697301785938760503455309",
"332361462481790647058370067929282761483",
"276063617981788960207517436503131370354",
"203565305329433175028353793333334835032",
"111673338798337675178828952554646323116",
"330551950114059819946125617565239577877",
"62456707559558278907109169901650202512",
"177031895952329143620873325647733539197",
"327039109210123678431856163689744265017",
"77397130865429019974245280346772607548",
"257163156264683960940488981904381430006",
"128338143778771436158069468179498940393",
"53711828437006975536064707561482006908",
"118934550810338443395589486622052428642"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4",
"signature_version": "v1",
"target": {
"file": "src/plugins/preauth/pkinit/pkinit_crypto_openssl.c"
}
},
{
"id": "CVE-2017-15088-b0147b26",
"deprecated": false,
"digest": {
"function_hash": "103045859072055760119567830516729182967",
"length": 1652.0
},
"signature_type": "Function",
"source": "https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4",
"signature_version": "v1",
"target": {
"file": "src/plugins/preauth/pkinit/pkinit_crypto_openssl.c",
"function": "get_matching_data"
}
}
]