In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the kdcasrep function in kdc/kerberos5.c and the derlengthvisiblestring function in lib/asn1/der_length.c.
{ "vanir_signatures": [ { "signature_version": "v1", "target": { "file": "kdc/kerberos5.c" }, "id": "CVE-2017-17439-45d566d2", "deprecated": false, "signature_type": "Line", "digest": { "line_hashes": [ "184552108741995966909798273234929043718", "31157069625652692581562993520782672132", "92289731964834894266176103875665865520", "220543229444911101941918136132963866440", "68088921273738415772594604441004796928", "289623454940078461526621765045642131000", "19653521005183287255750554540954066757", "238734535077344973939955929287016383729", "198986556732662134247394704136678794791", "172798049371050135097062238087022251110", "333345530607291890332505461811148112806", "197736238020111757745263551938246121115" ], "threshold": 0.9 }, "source": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887" }, { "signature_version": "v1", "target": { "file": "kdc/kerberos5.c", "function": "_kdc_as_rep" }, "id": "CVE-2017-17439-fa1b0857", "deprecated": false, "signature_type": "Function", "digest": { "length": 15811.0, "function_hash": "319009278022935075940704152087705260197" }, "source": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887" } ] }