Input validation error - CVE-2016-3119
Published: March 26, 2016 / Updated: August 4, 2020
Detailed vulnerability description
The vulnerability allows remote authenticated users to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
How to mitigate CVE-2016-3119
Sources
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00007.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html
- http://rhn.redhat.com/errata/RHSA-2016-2591.html
- http://www.securityfocus.com/bid/85392
- http://www.securitytracker.com/id/1035399
- https://github.com/krb5/krb5/commit/08c642c09c38a9c6454ab43a9b53b2a89b9eef99
- https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html