APP: Kerberos Multi-realm KDC NULL Pointer Dereference Denial of Service

This signature detects attempts to exploit a known vulnerability in the Kerberos protocol. The vulnerability is due to a NULL pointer dereference within the setup_server_realm() function when Kerberos is configured to serve multiple realms. A remote attacker can exploit this vulnerability by sending a malicious request to a vulnerable installation of Kerberos. Successful exploitation will cause the krb5kdc daemon to terminate resulting in a denial of service condition.

Extended Description

The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.

Affected Products

Opensuse opensuse

References

CVE: CVE-2013-1418

Short Name
APP:KERBEROS:MULTI-REALM-DOS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CVE-2013-1418 Denial Dereference KDC Kerberos Multi-realm NULL Pointer Service of
Release Date
02/24/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
Port
TCP/88
False Positive
Unknown
Vendors

Opensuse

Debian

Mit

CVSS Score

4.3

Found a potential security threat?