A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.
{ "vanir_signatures": [ { "digest": { "length": 2237.0, "function_hash": "281632458950095218231934864773643278513" }, "id": "CVE-2018-20217-2b9be4ce", "signature_version": "v1", "deprecated": false, "signature_type": "Function", "target": { "function": "kdc_process_s4u2self_req", "file": "src/kdc/kdc_util.c" }, "source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086" }, { "digest": { "length": 1519.0, "function_hash": "22009747526011531247411191432701765815" }, "id": "CVE-2018-20217-9deb1157", "signature_version": "v1", "deprecated": false, "signature_type": "Function", "target": { "function": "s4u_identify_user", "file": "src/lib/krb5/krb/s4u_creds.c" }, "source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086" }, { "digest": { "line_hashes": [ "275169878082459207433134400309769904522", "325437437607260974550496749957866301197", "211459628144645672959958375863273568099" ], "threshold": 0.9 }, "id": "CVE-2018-20217-b4599e87", "signature_version": "v1", "deprecated": false, "signature_type": "Line", "target": { "file": "src/kdc/kdc_util.c" }, "source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086" }, { "digest": { "line_hashes": [ "128921040204504305593903249595158023063", "204304021945698355911099436541501299156", "253680059342113239776293698208297650928", "35772295698068732454334995534124366979" ], "threshold": 0.9 }, "id": "CVE-2018-20217-e4d34f09", "signature_version": "v1", "deprecated": false, "signature_type": "Line", "target": { "file": "src/lib/krb5/krb/s4u_creds.c" }, "source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086" } ] }