{"id":"MGASA-2016-0306","summary":"Updated krb5 packages fix security vulnerability","details":"The validate_as_request function in kdc_util.c in the Key Distribution\nCenter (KDC) in MIT Kerberos 5 (aka krb5) before 1.14.3, when\nrestrict_anonymous_to_tgt is enabled, uses an incorrect client data\nstructure, which allows remote\nauthenticated users to cause a denial of service (NULL pointer dereference\nand daemon crash) via an S4U2Self request (CVE-2016-3120).\n","modified":"2026-02-04T03:44:09.617025Z","published":"2016-09-16T09:27:13Z","related":["CVE-2016-3120"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0306.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=19277"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/AWL3KYFRJIX37EAM4DKCQQIQP2WBKL35/"}],"affected":[{"package":{"name":"krb5","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/krb5?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.12.5-1.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0306.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}