APP: MIT Kerberos 5 build_principal_va Denial of Service
This signature detects attempts to exploit a known vulnerability against MIT Kerberos. The vulnerability occurs in build_principal_va() when a realm name containing a NULL byte is received: a buffer of only up to the NULL byte is allocated whereas the complete ASN.1 length of the realm name is used as the length of the buffer. A successful attack can result in a denial-of-service condition.
Extended Description
The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
Affected Products
Debian debian_linux
References
CVE: CVE-2015-2697
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Suse
Debian
Opensuse
Oracle
Mit
Canonical
4.0