VU#730793: Heimdal Kerbos vulnerable to remotely triggered NULL pointer dereference on 07/10/2022 at 7:25 pm


The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash.


A flawed logical condition allows a malicious actor to remotely trigger a NULL pointer dereference using a crafted negTokenInit token.


An attacker can use a specially crafted network packet to cause a vulnerable application to crash.


The latest version of code in the Heimdal master branch fixes the issue. However, the current stable release 7.7.0 does not include the fix.


Thanks to the International Continence Society for reporting this issue.

This document was written by Kevin Stephens.

Vendor Information

One or more vendors are listed for this advisory. Please reference the full report for more information.

Other Information



Date Public:

Date First Published:
Date Last Updated:
2022-10-07 19:24 UTC
Document Revision:

Related Posts
Clear Filters
Devel Group
Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.