Public Date:
1361050: CVE-2016-3120 krb5: S4U2Self KDC crash when anon is restricted
A NULL pointer dereference flaw was found in MIT Kerberos krb5kdc service. An authenticated attacker could use this flaw to cause krb5kdc to dereference a null pointer and crash by making an S4U2Self request, if the restrict_anonymous_to_tgt option was set to true.

Find out more about CVE-2016-3120 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 3.5
Base Metrics AV:N/AC:M/Au:S/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

CVSS v3 metrics

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity High
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact High

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (krb5) RHSA-2016:2591 2016-11-03

Affected Packages State

Platform Package State
Red Hat JBoss Web Server 3.0 krb5 Not affected
Red Hat JBoss EWS 2 krb5 Not affected
Red Hat JBoss EAP 7 krb5 Not affected
Red Hat JBoss EAP 6 krb5 Not affected
Red Hat Enterprise Linux 6 krb5 Will not fix
Red Hat Enterprise Linux 5 krb5 Not affected
Last Modified