CVE-2021-37750

Published on: 08/23/2021 12:00:00 AM UTC

Last Modified on: 10/25/2022 04:57:00 PM UTC

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Certain versions of Debian Linux from Debian contain the following vulnerability:

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.

  • CVE-2021-37750 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 6.5 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
CVE-2021-37750 MIT Kerberos 5 vulnerability in StarWind products www.starwindsoftware.com
text/html
URL Logo MISC www.starwindsoftware.com/security/sw-20220817-0004/
[SECURITY] [DLA 2771-1] krb5 security update lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20210930 [SECURITY] [DLA 2771-1] krb5 security update
Kerberos Security Advisories web.mit.edu
text/html
URL Logo MISC web.mit.edu/kerberos/advisories/
Releases · krb5/krb5 · GitHub github.com
text/html
URL Logo MISC github.com/krb5/krb5/releases
Fix KDC null deref on TGS inner body null server · krb5/[email protected] · GitHub github.com
text/html
URL Logo CONFIRM github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
CVE-2021-37750 MIT Kerberos 5 Vulnerability in NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20210923-0002/
[SECURITY] Fedora 33 Update: krb5-1.18.2-31.fc33 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2021-f2c8514f02
Oracle Critical Patch Update Advisory - July 2022 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpujul2022.html

Related QID Numbers

  • 159406 Oracle Enterprise Linux Security Update for krb5 (ELSA-2021-3576)
  • 159541 Oracle Enterprise Linux Security Update for krb5 (ELSA-2021-4788)
  • 178852 Debian Security Update for krb5 (DLA 2771-1)
  • 180600 Debian Security Update for krb5 (CVE-2021-37750)
  • 20317 Oracle Database 21c Critical Patch Update - January 2023
  • 20318 Oracle Database 19c Critical Patch Update - January 2023
  • 20319 Oracle Database 19c Critical OJVM Patch Update - January 2023
  • 239649 Red Hat Update for krb5 (RHSA-2021:3576)
  • 239903 Red Hat Update for krb5 (RHSA-2021:4788)
  • 257133 CentOS Security Update for krb5 (CESA-2021:4788)
  • 281836 Fedora Security Update for krb5 (FEDORA-2021-20b495cb94)
  • 281865 Fedora Security Update for krb5 (FEDORA-2021-f2c8514f02)
  • 296086 Oracle Solaris 11.4 Support Repository Update (SRU) 51.132.1 Missing (CPUOCT2022)
  • 353125 Amazon Linux Security Advisory for krb5 : ALAS2-2022-1738
  • 377262 Alibaba Cloud Linux Security Update for krb5 (ALINUX2-SA-2021:0068)
  • 377412 Alibaba Cloud Linux Security Update for krb5 (ALINUX3-SA-2021:0068)
  • 500277 Alpine Linux Security Update for krb5
  • 501964 Alpine Linux Security Update for krb5
  • 670820 EulerOS Security Update for krb5 (EulerOS-SA-2021-2714)
  • 670960 EulerOS Security Update for krb5 (EulerOS-SA-2021-2689)
  • 671029 EulerOS Security Update for krb5 (EulerOS-SA-2021-2664)
  • 671054 EulerOS Security Update for krb5 (EulerOS-SA-2021-2637)
  • 671234 EulerOS Security Update for krb5 (EulerOS-SA-2022-1172)
  • 730371 McAfee Web Gateway Multiple Vulnerabilities (WP-3335,WP-4131,WP-4159,WP-4237,WP-4259,WP-4329,WP-4348,WP-4355,WP-4376,WP-4407,WP-4421)
  • 751249 OpenSUSE Security Update for krb5 (openSUSE-SU-2021:3454-1)
  • 751297 OpenSUSE Security Update for krb5 (openSUSE-SU-2021:1411-1)
  • 752841 SUSE Enterprise Linux Security Update for krb5 (SUSE-SU-2022:4154-1)
  • 900435 Common Base Linux Mariner (CBL-Mariner) Security Update for krb5 (5995)
  • 901521 Common Base Linux Mariner (CBL-Mariner) Security Update for krb5 (6608)
  • 902338 Common Base Linux Mariner (CBL-Mariner) Security Update for krb5 (6608-1)
  • 940422 AlmaLinux Security Update for krb5 (ALSA-2021:3576)
  • 960057 Rocky Linux Security Update for krb5 (RLSA-2021:3576)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux9.0AllAllAll
Operating
System
FedoraprojectFedora33AllAllAll
ApplicationMitKerberos 5AllAllAllAll
ApplicationOracleCommunications Cloud Native Core Network Slice Selection Function22.1.0AllAllAll
ApplicationStarwindsoftwareStarwind Virtual Sanv8r1314338AllAll
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*:
  • cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8r13:14338:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2021-37750 : The Key Distribution Center KDC in MIT Kerberos 5 aka krb5 before 1.18.5 and 1.19.x before 1.1… twitter.com/i/web/status/1… 2021-08-23 05:04:54
Twitter Icon @LinInfoSec Krb5 - CVE-2021-37750: github.com/krb5/krb5/rele… 2021-08-23 11:05:47
Twitter Icon @threatmeter CVE-2021-37750 The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.… twitter.com/i/web/status/1… 2021-08-24 07:09:52
Reddit Logo Icon /r/nutanix AOS 5.20.3 available! 2022-01-25 08:34:08
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report