CVE-2024-37370: In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count...
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.26574%
CWE
Published
6/29/2024
Updated
3/13/2025
KEV Status
No
Technology
-
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis is based on the provided commit 55fbf435edbe2e92dd8101669b1ce7144bc96fef, which explicitly aims to fix CVE-2024-37370 and CVE-2024-37371. The commit message details the flaws: missing Extra Count verification (CVE-2024-37370) and insufficient length checks leading to memory safety issues (CVE-2024-37371).
The modified C functions (gss_krb5int_unseal_token_v3, gss_krb5int_unseal_v3_iov, and kg_unseal_iov_token) are directly involved in processing GSS wrap tokens.
gss_krb5int_unseal_token_v3had missing checks for both plaintext length (potentially leading to reads before buffer start) and Extra Count field consistency.gss_krb5int_unseal_v3_iovhad a missing check for Extra Count field consistency.kg_unseal_iov_tokenhad improper handling of ASN.1 wrapper lengths relative to the header buffer size, potentially leading to reads beyond the buffer. The patches add these missing checks and refine parsing logic, confirming these functions were the sites of the vulnerabilities.