In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the kdcasrep function in kdc/kerberos5.c and the derlengthvisiblestring function in lib/asn1/der_length.c.
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"184552108741995966909798273234929043718",
"31157069625652692581562993520782672132",
"92289731964834894266176103875665865520",
"220543229444911101941918136132963866440",
"68088921273738415772594604441004796928",
"289623454940078461526621765045642131000",
"19653521005183287255750554540954066757",
"238734535077344973939955929287016383729",
"198986556732662134247394704136678794791",
"172798049371050135097062238087022251110",
"333345530607291890332505461811148112806",
"197736238020111757745263551938246121115"
]
},
"signature_type": "Line",
"target": {
"file": "kdc/kerberos5.c"
},
"deprecated": false,
"source": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887",
"signature_version": "v1",
"id": "CVE-2017-17439-45d566d2"
},
{
"digest": {
"function_hash": "319009278022935075940704152087705260197",
"length": 15811.0
},
"signature_type": "Function",
"target": {
"function": "_kdc_as_rep",
"file": "kdc/kerberos5.c"
},
"deprecated": false,
"source": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887",
"signature_version": "v1",
"id": "CVE-2017-17439-fa1b0857"
}
]