CVE-2018-20217

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-20217
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-20217.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-20217
Downstream
Related
Published
2018-12-26T21:29:02.543Z
Modified
2025-11-14T03:34:55.601724Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.

References

Affected packages

Git / github.com/krb5/krb5

Affected ranges

Type
GIT
Repo
https://github.com/krb5/krb5
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

vanir_signatures

[
    {
        "source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086",
        "id": "CVE-2018-20217-2b9be4ce",
        "signature_version": "v1",
        "digest": {
            "function_hash": "281632458950095218231934864773643278513",
            "length": 2237.0
        },
        "target": {
            "file": "src/kdc/kdc_util.c",
            "function": "kdc_process_s4u2self_req"
        },
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086",
        "id": "CVE-2018-20217-9deb1157",
        "signature_version": "v1",
        "digest": {
            "function_hash": "22009747526011531247411191432701765815",
            "length": 1519.0
        },
        "target": {
            "file": "src/lib/krb5/krb/s4u_creds.c",
            "function": "s4u_identify_user"
        },
        "deprecated": false,
        "signature_type": "Function"
    },
    {
        "source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086",
        "id": "CVE-2018-20217-b4599e87",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "275169878082459207433134400309769904522",
                "325437437607260974550496749957866301197",
                "211459628144645672959958375863273568099"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "src/kdc/kdc_util.c"
        },
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "source": "https://github.com/krb5/krb5/commit/5e6d1796106df8ba6bc1973ee0917c170d929086",
        "id": "CVE-2018-20217-e4d34f09",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "128921040204504305593903249595158023063",
                "204304021945698355911099436541501299156",
                "253680059342113239776293698208297650928",
                "35772295698068732454334995534124366979"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "src/lib/krb5/krb/s4u_creds.c"
        },
        "deprecated": false,
        "signature_type": "Line"
    }
]