
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in MIT Kerberos 5 (krb5) versions before 1.20.2 and 1.21.x before 1.21.1, specifically in the lib/kadm5/kadm_rpc_xdr.c component. The vulnerability (CVE-2023-36054) involves freeing an uninitialized pointer due to _xdr_kadm5_principal_ent_rec not validating the relationship between n_key_data and the key_data array count (NVD, MIT Kerberos).
The vulnerability exists in the _xdr_kadm5_principal_ent_rec function within lib/kadm5/kadm_rpc_xdr.c. The issue stems from improper validation between n_key_data and the key_data array count, which can lead to freeing an uninitialized pointer. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network accessibility with low attack complexity and requiring low privileges (NVD).
When successfully exploited, this vulnerability can cause a kadmind process crash through the freeing of uninitialized pointers. While remote code execution is considered unlikely, the vulnerability primarily affects system availability. An attacker with control of a kadmin server can also cause a kadmin client to crash (NetApp Advisory).
The vulnerability has been fixed in MIT Kerberos 5 versions 1.20.2 and 1.21.1. Organizations are advised to upgrade to these or later versions. Multiple vendors have also released patches for their affected products, including NetApp ONTAP 9 and Management Services for Element Software (NetApp Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."