APP: MIT Kerberos 5 KDC pkinit_check_kdc_pkid NULL Pointer Dereference

This signature detects attempts to exploit a known vulnerability against MIT Kerberos 5 KDC Server. A successful attack can result in a denial-of-service condition.

Extended Description

The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.

Affected Products

Opensuse opensuse

References

BugTraq: 58144

CVE: CVE-2013-1415

Short Name
APP:KERBEROS:MIT-KRB5-DOS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
5 CVE-2013-1415 Dereference KDC Kerberos MIT NULL Pointer bid:58144 pkinit_check_kdc_pkid
Release Date
04/15/2013
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Opensuse

Mit

CVSS Score

5.0

Found a potential security threat?