CVE-2017-11462 - Double Free

Severity

75%

Complexity

99%

Confidentiality

106%

Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.

Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.

CVSS 3.0 Base Score 9.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Demo Examples

Double Free

CWE-415

Double Free

CWE-415

While contrived, this code should be exploitable on Linux distributions which do not ship with heap-chunk check summing turned on.


               
}
free(buf1R2);

Overview

First reported 7 years ago

2017-09-13 16:29:00

Last updated 5 years ago

2020-01-21 15:47:00

Affected Software

MIT Kerberos 5 1.14

1.14

Mit Kerberos 5 1.14 Alpha 1

1.14

Mit Kerberos 5 1.14 Beta 1

1.14

Mit Kerberos 5 1.14 Beta 2

1.14

Mit Kerberos 5 1.14.1

1.14.1

Mit Kerberos 5 1.14.2

1.14.2

Mit Kerberos 5 1.14.3

1.14.3

Mit Kerberos 5 1.14.4

1.14.4

Mit Kerberos 5 1.14.5

1.14.5

Mit Kerberos 5 1.15

1.15

Mit Kerberos 5 1.15.1

1.15.1

Mit Kerberos 5 1.15.1 Beta 1

1.15.1

Mit Kerberos 5 1.15.1 Beta 2

1.15.1

Fedora 25

25

Fedora 26

26

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.