CVE-2023-36054

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-36054
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-36054.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-36054
Downstream
Related
Published
2023-08-07T19:15:09Z
Modified
2025-09-16T07:31:35.593805Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

lib/kadm5/kadmrpcxdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because xdrkadm5principalentrec does not validate the relationship between nkeydata and the keydata array count.

References

Affected packages

Alpine:v3.17

krb5

Package

Name
krb5
Purl
pkg:apk/alpine/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.2-r0

Affected versions

1.*

1.11-r0
1.11-r1
1.11-r2
1.11.2-r0
1.11.2-r1
1.11.2-r2
1.11.3-r0
1.11.4-r0
1.12.1-r0
1.12.2-r0
1.13-r0
1.13-r1
1.13.1-r0
1.13.1-r1
1.13.2-r0
1.13.2-r1
1.13.2-r2
1.14-r0
1.14-r1
1.14-r2
1.14.3-r0
1.14.3-r1
1.14.3-r2
1.15.1-r0
1.15.2-r0
1.15.2-r1
1.15.2-r2
1.15.3-r0
1.15.3-r1
1.15.4-r0
1.15.5-r0
1.17-r0
1.17.1-r0
1.18-r0
1.18.1-r0
1.18.2-r0
1.18.3-r0
1.18.3-r1
1.18.4-r0
1.19.2-r0
1.19.2-r1
1.19.2-r2
1.19.2-r3
1.19.2-r4
1.19.3-r0
1.19.3-r1
1.19.3-r2
1.20-r0
1.20.1-r0

Alpine:v3.18

krb5

Package

Name
krb5
Purl
pkg:apk/alpine/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.2-r0

Affected versions

1.*

1.11-r0
1.11-r1
1.11-r2
1.11.2-r0
1.11.2-r1
1.11.2-r2
1.11.3-r0
1.11.4-r0
1.12.1-r0
1.12.2-r0
1.13-r0
1.13-r1
1.13.1-r0
1.13.1-r1
1.13.2-r0
1.13.2-r1
1.13.2-r2
1.14-r0
1.14-r1
1.14-r2
1.14.3-r0
1.14.3-r1
1.14.3-r2
1.15.1-r0
1.15.2-r0
1.15.2-r1
1.15.2-r2
1.15.3-r0
1.15.3-r1
1.15.4-r0
1.15.5-r0
1.17-r0
1.17.1-r0
1.18-r0
1.18.1-r0
1.18.2-r0
1.18.3-r0
1.18.3-r1
1.18.4-r0
1.19.2-r0
1.19.2-r1
1.19.2-r2
1.19.2-r3
1.19.2-r4
1.19.3-r0
1.19.3-r1
1.19.3-r2
1.20-r0
1.20.1-r0
1.20.1-r1

Debian:11

krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.18.3-6+deb11u4

Affected versions

1.*

1.18.3-6
1.18.3-6+deb11u1
1.18.3-6+deb11u2
1.18.3-6+deb11u3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12

krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.1-2+deb12u1

Affected versions

1.*

1.20.1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13

krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.1-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14

krb5

Package

Name
krb5
Purl
pkg:deb/debian/krb5?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.1-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git

github.com/krb5/krb5

Affected ranges

Type
GIT
Repo
https://github.com/krb5/krb5
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

{
    "vanir_signatures": [
        {
            "id": "CVE-2023-36054-470cf1b5",
            "digest": {
                "length": 1784.0,
                "function_hash": "292458871393797026895224770310205177433"
            },
            "signature_type": "Function",
            "deprecated": false,
            "target": {
                "file": "src/lib/kadm5/kadm_rpc_xdr.c",
                "function": "_xdr_kadm5_principal_ent_rec"
            },
            "signature_version": "v1",
            "source": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd"
        },
        {
            "id": "CVE-2023-36054-ea2fc528",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "334156890665377397254782129423192701014",
                    "291711314844331628929990863608957466062",
                    "78628825109575425569660732236780644162",
                    "261916500496618123580874075940328985736",
                    "30376023932640832738304776029120750510",
                    "52577924269244501238970656709228176349",
                    "142673664801473503695693422137628437538",
                    "247089036493975321463435678447079451818",
                    "268291072872507344209176579942598505100",
                    "283004837450157505273504451698654990402",
                    "198860051218332904966840358757088003952",
                    "332792275552660967371033837008166398627",
                    "181968824239837814858031817203727806594",
                    "289882732570170768537025219367137493777"
                ]
            },
            "signature_type": "Line",
            "deprecated": false,
            "target": {
                "file": "src/lib/kadm5/kadm_rpc_xdr.c"
            },
            "signature_version": "v1",
            "source": "https://github.com/krb5/krb5/commit/ef08b09c9459551aabbe7924fb176f1583053cdd"
        }
    ]
}