APP: Kerberos Denial of Service over TCP (2)

This signature detects a heap corruption attack in the MIT Kerberos V5 Key Distribution Center (KDC) implementation. The vulnerability is caused from improper handling of an error case. An unauthenticated remote attacker can leverage this vulnerability to cause a denial of service or to execute arbitrary code, potentially compromising an entire Kerberos realm.

Extended Description

The Kerberos 5 Key Distribution Center (KDC) implementation of Kerberos is affected by a remote denial-of-service vulnerability. This issue arises because the application tries to free uninitialized memory at a random address when handling a remote request over TCP. Specifically, the vulnerability arises when the application handles a principle name consisting of zero components. All MIT Kerberos 5 releases up to and including krb5-1.4.1 are vulnerable. Third-party application servers employing Kerberos 5 may be affected as well.

Affected Products

Conectiva linux

Short Name
APP:KERBEROS:KBR-DOS-TCP-2
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
(2) CVE-2005-1174 Denial Kerberos Service TCP bid:14240 of over
Release Date
02/21/2006
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3727
Port
TCP/88
False Positive
Unknown
Vendors

Red_hat

Conectiva

Suse

Apple

Trustix

Sun

Gentoo

Turbolinux

Mit

Sgi

Ubuntu

Mandriva

Debian

Ibm

CVSS Score

5.0

Found a potential security threat?