The validateasrequest function in kdcutil.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrictanonymoustotgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Function", "target": { "file": "src/kdc/kdc_util.c", "function": "validate_as_request" }, "deprecated": false, "digest": { "length": 2440.0, "function_hash": "114832735742266611359956904032110077760" }, "id": "CVE-2016-3120-5b944c3f", "source": "https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "src/kdc/kdc_util.c" }, "deprecated": false, "digest": { "line_hashes": [ "188127353243240745192543305669040301596", "230037708568997149536374049167456462409", "300683140533483817075971560559028595358", "160102550585688257047493868450817751983" ], "threshold": 0.9 }, "id": "CVE-2016-3120-9c22472c", "source": "https://github.com/krb5/krb5/commit/93b4a6306a0026cf1cc31ac4bd8a49ba5d034ba7" } ] }