APP: MIT Kerberos 5 kpasswd UDP Ping-Pong Denial Of Service
This signature detects attempts to exploit a known flaw in the MIT Kerberos 5 kadmind server. MIT Kerberos 5 kadmind server is vulnerable to a denial-of-service vulnerability. The kadmind server responds to a malformed kpasswd UDP request packet with a kpasswd UDP reply packet which can be exploited to exhaust CPU and network resources with "ping-pong" UDP attack on port 464. A remote attacker may cause a denial-of-service vulnerability by sending a malformed spoofed packet to multiple machines running the vulnerable service.
Extended Description
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
Affected Products
Fedoraproject fedora
References
CVE: CVE-2002-2443
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Redhat
Fedoraproject
Mit
Opensuse
Debian
Canonical
5.0