APP: Kerberos Denial of Service over TCP (2)
This signature detects a heap corruption attack in the MIT Kerberos V5 Key Distribution Center (KDC) implementation. The vulnerability is caused from improper handling of an error case. An unauthenticated remote attacker can leverage this vulnerability to cause a denial of service or to execute arbitrary code, potentially compromising an entire Kerberos realm.
Extended Description
The Kerberos 5 Key Distribution Center (KDC) implementation of Kerberos is affected by a remote denial-of-service vulnerability. This issue arises because the application tries to free uninitialized memory at a random address when handling a remote request over TCP. Specifically, the vulnerability arises when the application handles a principle name consisting of zero components. All MIT Kerberos 5 releases up to and including krb5-1.4.1 are vulnerable. Third-party application servers employing Kerberos 5 may be affected as well.
Affected Products
Conectiva linux
References
BugTraq: 14240
CVE: CVE-2005-1174
URL: http://web.mit.edu/kerberos/advisories/2005-002-patch_1.4.1.txt
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Conectiva
Suse
Apple
Trustix
Sun
Gentoo
Turbolinux
Mit
Sgi
Ubuntu
Mandriva
Debian
Ibm
5.0