CVE-2023-39975

Source
https://cve.org/CVERecord?id=CVE-2023-39975
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-39975.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-39975
Downstream
Related
Published
2023-08-16T15:15:11.277Z
Modified
2026-04-12T08:01:19.795033Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

kdc/dotgsreq.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.

References

Affected packages

Git / github.com/krb5/krb5

Affected ranges

Type
GIT
Repo
https://github.com/krb5/krb5
Events
Database specific
{
    "cpe": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
    "extracted_events": [
        {
            "introduced": "1.21"
        },
        {
            "fixed": "1.21.2"
        }
    ],
    "source": [
        "CPE_FIELD",
        "REFERENCES"
    ]
}

Affected versions

krb5-1.*
krb5-1.21-final
krb5-1.21.1-final

Database specific

vanir_signatures_modified
"2026-04-12T08:01:19Z"
vanir_signatures
[
    {
        "digest": {
            "length": 4719.0,
            "function_hash": "320454298178522418562667310032970752216"
        },
        "signature_type": "Function",
        "signature_version": "v1",
        "id": "CVE-2023-39975-cda3b428",
        "deprecated": false,
        "target": {
            "function": "tgs_issue_ticket",
            "file": "src/kdc/do_tgs_req.c"
        },
        "source": "https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840"
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "249527239416159802841043011231302665113",
                "298421117556655566649449782382697694538",
                "158274467088385907000702346063051540256",
                "223905517715603812869864634685656201230"
            ]
        },
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2023-39975-d6bbdbab",
        "deprecated": false,
        "target": {
            "file": "src/kdc/do_tgs_req.c"
        },
        "source": "https://github.com/krb5/krb5/commit/88a1701b423c13991a8064feeb26952d3641d840"
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-39975.json"