APP: MIT Kerberos 5 KDC prep_reprocess_req NULL Pointer Dereference

This signature detects attempts to exploit a known vulnerability against MIT Kerberos 5 KDC prep_reprocess_req function. A successful attack can result in a denial-of-service condition.

Extended Description

The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.

Affected Products

Redhat enterprise_linux_server_aus

References

CVE: CVE-2013-1416

Short Name
APP:KERBEROS:PREP-REPROCESS-REQ
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
5 CVE-2013-1416 Dereference KDC Kerberos MIT NULL Pointer prep_reprocess_req
Release Date
04/26/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3735
Port
UDP/88
False Positive
Unknown
Vendors

Opensuse

Fedoraproject

Mit

Redhat

CVSS Score

4.0

Found a potential security threat?