HIGH · 7.1

CVE-2015-2696

lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and proc...

Vulnerability Description

lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.

CVSS Score

7.1

HIGH

AV:N/AC:M/Au:N/C:N/I:N/A:C
Confidentiality
NONE
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
MitKerberos 5< 1.14
OpensuseLeap42.1
OpensuseOpensuse13.1
SuseLinux Enterprise Desktop12
SuseLinux Enterprise Server12
SuseLinux Enterprise Software Development Kit12
DebianDebian Linux7.0
CanonicalUbuntu Linux12.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-2696?

CVE-2015-2696 is a vulnerability with a CVSS score of 7.1 (HIGH). lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and proc...

How severe is CVE-2015-2696?

CVE-2015-2696 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-2696?

Check the references section above for vendor advisories and patch information. Affected products include: Mit Kerberos 5, Opensuse Leap, Opensuse Opensuse, Suse Linux Enterprise Desktop, Suse Linux Enterprise Server.