DEBIAN-CVE-2017-17439

Source
https://security-tracker.debian.org/tracker/CVE-2017-17439
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2017-17439.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2017-17439
Upstream
Published
2017-12-06T15:29:00Z
Modified
2025-09-19T06:26:12Z
Summary
[none]
Details

In Heimdal through 7.4, remote unauthenticated attackers are able to crash the KDC by sending a crafted UDP packet containing empty data fields for client name or realm. The parser would unconditionally dereference NULL pointers in that case, leading to a segmentation fault. This is related to the kdcasrep function in kdc/kerberos5.c and the derlengthvisiblestring function in lib/asn1/der_length.c.

References

Affected packages

Debian:11 / heimdal

Package

Name
heimdal
Purl
pkg:deb/debian/heimdal?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.5.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / heimdal

Package

Name
heimdal
Purl
pkg:deb/debian/heimdal?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.5.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / heimdal

Package

Name
heimdal
Purl
pkg:deb/debian/heimdal?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.5.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / heimdal

Package

Name
heimdal
Purl
pkg:deb/debian/heimdal?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.5.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}